Bookmarks Menu
Mozilla Firefox
- Help and Tutorials
- Customize Firefox
- Get Involved
- About Us
- Aide et didacticiels
- Personnaliser Firefox
- Contribuer
- À propos de Mozilla
Ubuntu and Free Software links
- Ubuntu
- Ubuntu Wiki (community-edited website)
- Make a Support Request to the Ubuntu Community
- Debian (Ubuntu is based on Debian)
- Recent Tags
- Constant Contact Review 2020 | Email Marketing and Survey Software Reviews - business.com
Mozilla Firefox
- Customize Firefox
Bookmarks Toolbar
Tech_Startup
Trigger_Warnings_System
Existent_Solutions
VidAngel
- VidAngel - Wikipedia
- VidAngel | Watch Movies However The BLEEP You Want
Feerless
- Team Feerless (@feerlessapp) / Twitter
- Feerless app demo - YouTube
Founder
- dmleong (Danielle Leong) · GitHub
- Speaker: Danielle Leong | AlterConf
- Danielle Leong - founder at Feerless
- Danielle Leong (@tsunamino) / Twitter - feerless founder
- QCon San Francisco | Danielle Leong | Engineering Manager on GitHub's Community and Safety Team
- Consensual Software: How to Prioritize User Safety - Danielle Leong
- Better Behavior in Tech? Danielle Leong asks for respectable conduct | Hack Reactor
Media_Coverage
- Feerless Shows Trigger Warnings for People with PTSD
- Feerless - melissacronin.com
- Feerless Helps PTSD and Phobia Sufferers Avoid Triggering Moments While Watching Netflix | Medgadget
- PTSD Trigger-Warning Apps : Feerless
- Feerless
- New App Will Make Netflix Binge-Watching Safer for People With PTSD | The Mighty
- Content-control software - Wikipedia
- Unconsenting Media
- Trigger Warning Database
- This Could Be Triggering.
- Is It Consensual
- is there suicide in it?
- Common Sense Media: Age-Based Media Reviews for Families
- Kids-In-Mind.com | Parents' Movie Guide, Ratings and Reviews
- Where's The Jump? – A Movie Jump Scare Database
- phobiasatthemovies.com/
- Lit Triggers
Partial_Solutions
- GitHub - bryantb2/OPES-FREEDOM: Trigger warning: you might not like this website if you have 5 cats and drive a mini-van.
- GitHub - riadrahman013/Research-on-Early-Threat-Warning-via-Speech-and-Emotion-Recognition-from-Voice-Calls.-: The goal of this project or research was to create a very basic system to detect threat in voice calls by finding trigger words and emotion from each audio sample and then using those features to train the machine learning algorithm.
- GitHub - annabelnlau/TW-: TW: [Trigger Warning] is a Chrome extension that creates an alert to warn a user of potentially sensitive content on Wikipedia.
- GitHub - origami1/TriggerWarnings: Hate watching a movie only to have the <dog die | etc> at the very end? These are the movie ratings we really need.
- GitHub - TimShier/TriggerWarning: A Chrome Extension to remove triggering content from your social media timelines.
- GitHub - philhchen/trigger-warning: Analyzes and predicts the "inflammatory content" of a post using NLP sentiment analysis
- GitHub - davidmason/trigger-warning: A browser plugin to teach the browser what you do not wish to see.
- GitHub - DarkArtsAndSciences/trigger-warning: Boids with PTSD.
- GitHub - fragmad/trigger-warning-wordpress: A Wordpress plugin to provide trigger warnings on contents and track their usage.
- GitHub - matthewzapata/twitter-trigger-warnings: Predicting if a movie has a self-harm scene based on tweets.
- triggerBlocker/triggerBlocker at master · cbursey/triggerBlocker · GitHub
- Soothe - Chrome Web Store
- Warn Me - Chrome Web Store
- MovieCleaner - Chrome Web Store - subtitles / caption analysis
- See No Evil 5.0 - Automatic Word Censor - Chrome Web Store
- YouTube Audio Filtering - Chrome Web Store - subtitles captions analysis
- Chrome Censored - Chrome Web Store
- Ultimate Profanity Filter - Chrome Web Store
PTSD_resources
- New study says trigger warnings are useless. Does that mean they should be abandoned?
- Trauma trigger - Wikipedia
- Do Trigger Warnings Work? - The Atlantic
- 'Trigger warnings' may do more harm than good, study finds
- The latest study on trigger warnings finally convinced me they’re not worth it.
- The Trouble with Trigger Warnings
- Why trigger warnings are really so controversial, explained - Vox
- Trigger Warnings Fail to Help and May Even Harm - Association for ...
- Colleges, Don't Be So Quick On The Trigger Warnings. They May Misfire.
- Pétition · Place trigger warnings on TV shows and films on streaming · Change.org
- Startpage.com
- PTSD Facts and Statistics | The Recovery Village
- PTSD Treatment | The Recovery Village
- NIMH » Post-Traumatic Stress Disorder (PTSD)
- How Common is PTSD in Adults? - PTSD: National Center for PTSD
Idea_Development
Crowdsourcing-based
- Firefox Extension Workshop | Get help creating & publishing Firefox extensions.
- Browser Extensions - Mozilla | MDN
- Your first extension - Mozilla | MDN
- Your second extension - Mozilla | MDN
- JavaScript APIs - Mozilla | MDN
- bookmarks - Mozilla | MDN
- webextensions-examples/background.js at master · mdn/webextensions-examples · GitHub
- Popups - Mozilla | MDN
- Popups - Mozilla | MDN
- browserAction - Mozilla | MDN
- Photon Design System
- Build a secure extension | Firefox Extension Workshop
- Developing extensions for Firefox for Android | Firefox Extension Workshop
- Content scripts - Mozilla | MDN
- Anatomy of an extension - Mozilla | MDN
- Anatomy of an extension - Mozilla | MDN
- manifest.json - Mozilla | MDN
- Example extensions - Mozilla | MDN
- GitHub - mdn/webextensions-examples: Example Firefox add-ons created using the WebExtensions API
- browser-extension-template/package.json at master · notlmn/browser-extension-template · GitHub
- Debugging | Firefox Extension Workshop
- JavaScript console is more than console.log() | by Grigor Khachatryan | devgorilla | Medium
- console - Web APIs | MDN
- Startpage.com Search results
- Building a cross-browser extension - Mozilla | MDN
- Browser compatibility for manifest.json - Mozilla | MDN
- Browser support for JavaScript APIs - Mozilla | MDN
- MDN-Browser-Compatibility-Report-2020.pdf
- Polyfill - MDN Web Docs Glossary: Definitions of Web-related terms | MDN
- Extension Compatibility Tester
- GitHub - mozilla/webextension-polyfill: A lightweight polyfill library for Promise-based WebExtension APIs in Chrome
- Handling common JavaScript problems - Learn web development | MDN
- One Browser Extension to Rule Them All | by Fabio Manganiello | Better Programming | Medium
- Create a cross-browser extension in 2020 - Install and test your WebExtension - CAMYA
- Cross-Browser Testing: Best Practices and Useful Resources - DZone Performance
- Porting a Google Chrome extension | Firefox Extension Workshop
- Chrome incompatibilities - Mozilla | MDN
- Develop Extensions - Google Chrome
- chrome.browserAction - Google Chrome
- Sample Extensions - Google Chrome
- Getting Started Tutorial - Google Chrome
- Overview - Google Chrome
- Chrome APIs - Google Chrome
- Startpage.com Search results
- chrome.tabs - Google Chrome
- chrome.tabs - Google Chrome
- Content Scripts - Google Chrome
- Startpage.com Search results
- javascript - Debug popup.html of a Chrome Extension? - Stack Overflow
- Google Chrome / Firefox do not see extension output in console - Stack Overflow
- Debugging Extensions - Google Chrome
- tabs.removeCSS() - Mozilla | MDN
- chrome.tabs - Google Chrome
- javascript - browser.tabs.removeCSS is not working in Chrome extension? - Stack Overflow
- Get Started with Debugging JavaScript in Chrome DevTools
- How to use console.log() to debug a Chrome extension? - Stack Overflow
- Startpage.com Search results
- Chrome: console.log, console.debug are not working - Stack Overflow
- Google is shutting down paid Chrome extensions - The Verge
- Startpage.com Search results
- How video streaming works on the web: An introduction | by Paul Berberian | CANAL+ TECH | Medium
- Live streaming web audio and video - Developer guides | MDN
- Streams API - Web APIs | MDN
- Netflix Party is now Teleparty - Chrome Web Store
- Netflix Party: synchronize Netflix video playback | Stephan Boyer
- GitHub - netflixparty1/netflixparty-chrome: A tool for synchronized Netflix consumption.
- Watch Netflix Together: A Chrome Extension Developed By A Malaysian
- Metastream Remote – Get this Extension for 🦊 Firefox (en-US)
- Metastream Remote - Chrome Web Store
- Startpage.com Search results
- Regarder Netflix dans Kodi sans se prendre la tête | Geekzone.fr
- How to Install Netflix on Kodi – Actually Works in 2020
- GitHub - CastagnaIT/plugin.video.netflix: InputStream based Netflix plugin for Kodi
- GitHub - asciidisco/plugin.video.netflix: Inputstream based Netflix plugin for Kodi
- Startpage.com Search results
- Review of the new Firefox developer browser. Built for developers.
- Upgraded - Wappalyzer
AI-powered
Amirai_Ziai-AI_Kissing_Detector
Amirai_Zirai_Resources
- Amir Ziai – Towards Data Science
- Amir Ziai - Senior Machine Learning Engineer - Netflix | LinkedIn
- Amir Ziai - Google Scholar
- amazon.com/Amir-Ziai/e/B07KFQ5SHD%3Fref=dbs_a_mng_rwt_scns_share
- amirziai (Amir Ziai) · GitHub
- Amir Ziai – Medium
- A Netflix Scientist Has Taught An A.I. To Recognize Movie Kissing Scenes
- GitHub - amirziai/kissing-detector: Kissing Detector - CS231n project
- conv neural network - tuple object not callable when building a CNN in Pytorch - Stack Overflow
- Startpage.com Search results
- WhatsApp
- A Netflix Scientist Has Taught An A.I. To Recognize Movie Kissing Scenes
- GitHub - amirziai/kissing-detector: Kissing Detector - CS231n project
- User Guide — MoviePy 1.0.2 documentation
- movies description for visually impaired people at DuckDuckGo
- artificial intelligence recognize movie genre at DuckDuckGo
- Using AI to understand the way a movie “looks” and “sounds” like
- Hollywood Is Using Artificial Intelligence To Pick Its Next Blockbuster
- Deepfakes Are Going To Wreak Havoc On Society. We Are Not Prepared.
- data-publi-5657.pdf
- Y18-1007.pdf
- Microsoft Word - Tanenbaum Genre Paper Draft 1.doc - Tanenbaum_GenreTree_Paper.pdf
- guess movie genre from susbtitles at DuckDuckGo
- Movie Genre Prediction Using Multi Label Classification
- audio description netflix at DuckDuckGo
- Audio description - Wikipedia
- Using the Video Intelligence API with C#
- IA Video – Analyse de contenus vidéo | Google Cloud
- Violent scene detection algorithm based on kernel extreme learning machine and three-dimensional histograms of gradient orientation | SpringerLink
- Startpage.com Search results
- Startpage.com Search results
- RUG01-001887239_2012_0001_AC.pdf
- Classifying offensive sites based on image content
- Speech-to-Text basics | Cloud Speech-to-Text Documentation
- Startpage.com Search results
- !etd.send_file
- Filter unwanted YouTube comments the easy way
- Alphabet's AI-powered Chrome extension hides toxic comments | Engadget
- gadgethacks.com/
- Startpage.com Search results
- Audio Descriptions for Netflix Movies and TV Shows
- Ultimate Guide to Audio Description – 3Play Media
- AD on demand | The Accessible Digital Project
- Startpage.com Search results
- torch.Tensor — PyTorch master documentation
- Module — PyTorch master documentation
- torch.unsqueeze — PyTorch master documentation
- What is the difference between view() and unsqueeze()? - PyTorch Forums
- python - What does "unsqueeze" do in Pytorch? - Stack Overflow
- Flatten, Reshape, and Squeeze Explained - Tensors for Deep Learning with PyTorch - deeplizard
- python 3.x - TypeError: 'module' object is not callable in pytorch - Stack Overflow
- Startpage.com Search results
- Import AI 150: Training a kiss detector; bias in AI, rich VS poor edition; and just how good is deep learning surveillance getting? | Import AI
- Startpage.com Search results
- Startpage.com Search results
- ResNet-18 convolutional neural network - MATLAB resnet18 - MathWorks France
- Nevernude: Automatically cut out NSFW nudity from videos using Machine Box + ffmpeg | by Mat Ryer | Becoming Human: Artificial Intelligence Magazine
- Predicting Movie Genres Based on Plot Summaries | by Kunal Gupta | Medium
- Fingerprinting Images for Near-Duplicate Detection – Real Python - unique identifier, hashing
UAV-to-UAV_Anti-Crash_Communications
Existant_Solutions
- Drone Anti-Crash Systems - Where The Safety Is A Number One Priority
- Startpage.com Search results
- A drone anti-collision system: Maintaining a fixed distance from a target during the flight - IEEE Conference Publication
- Startpage.com Search results
- 12 Top Collision Avoidance Drones And Obstacle Detection Explained – DroneZon
- Drone Collision Avoidance for Beginners - Terabee
- Startpage.com Search results
- Preparing the Ground for Drone Communications | IEEE Communications Society
- Startpage.com Search results
- UAV-to-UAV Communication Options for Civilian Applications - IEEE Conference Publication
- UAV swarm communication and control architectures: a review - Journal of Unmanned Vehicle Systems
Bookmarks-Videos_Classifiers
- Startpage.com Search results
- benz2006automatic.pdf
- Content Bookmarking and Recommendation - W12-5809.pdf
- The 18 Best Read It Later and Bookmarking Apps | Zapier
- Startpage.com Search results
- Delicious (website) - Wikipedia
- Startpage.com Search results
- SiteBar - Wikipedia
Project_Management
Customer_Feedback_BCP
- Startpage.com Search results
- Customer Feedback Strategy: The Only Guide You'll Ever Need
- Startpage.com Search results
- 5 Agile best practices | GitLab
- Git Wars: Why I'm switching to GitLab | GitLab
- A way for startups to build a solid IT infrastructure | GitLab
- General Settings · Settings · TheElite · GitLab
- unlimited private repos gitlab - Google Search
- BEST 28 UML Tools in 2020
- diagrams.net
- best practices for team gitlab - Google Search
- A Beginner's Guide to GitLab | Unito
- GitLab Workflow: An Overview | GitLab
- Introduction to GitLab Workflow - YouTube
- GitLab in software development - part 1: Workflow
- Confluence is where information goes to die - DEV
- Project management 101: a phase-by-phase guide | Atlassian
- GitLab Workflow: An Overview | GitLab
- Introduction to GitLab Workflow - YouTube
- GitLab in software development - part 1: Workflow
- Wiki | GitLab
- Startpage.com Search results
- Org mode for Emacs – Your Life in Plain Text
- agile - How to implement Epics on Gitlab without Enterprise Edition? - Project Management Stack Exchange
- Epics/stories in GitLab FOSS - Stack Overflow
- The Mythical Man-Month - Wikipedia
Ideation
- Organic Startup Ideas
- How to Start a Startup
- Ideas for Startups
- The Hardest Lessons for Startups to Learn
- Essays
- Beating the Averages
- A Student's Guide to Startups
- Hiring is Obsolete
- Learning from Founders
- Founders at Work: Stories of Startups; Early Days | Jessica Livingston | download
- Founders at Work Stories of Startups Early Days by Jessica Livingston (z-lib.org).pdf
- The Future of Web Startups
- Disconnecting Distraction
- Why to Start a Startup in a Bad Economy
- Startups in 13 Sentences
- Taste for Makers
- Schlep Blindness
- Why Smart People Have Bad Ideas
- Startup Growth Calculator
- Great Hackers
- Haters
- Startup = Growth
- What We Look for in Founders
- Why There Aren't More Googles
- How Not to Die
- Why Startup Hubs Work
- Cities and Ambition
- Why to Not Not Start a Startup
- Subject: Airbnb
- Founder Control
- The Patent Pledge
- Tablets
- The Top Idea in Your Mind
- Don't Talk to Corp Dev
- Why It's Safe for Founders to Be Nice
- The Fatal Pinch
- What Startups Are Really Like
- The Hardest Lessons for Startups to Learn
- The 18 Mistakes That Kill Startups
- The Hacker's Guide to Investors
- A Fundraising Survival Guide
- The Anatomy of Determination
- How to Do What You Love
- Ramen Profitable
- Maker's Schedule, Manager's Schedule
- Good and Bad Procrastination
- Taste for Makers
- General and Surprising
- Half-Assed Startup: Start your company and keep your day job - Venture Hacks
- You Weren't Meant to Have a Boss
- Hiring is Obsolete
- The Bus Ticket Theory of Genius
- The Founder’s Guide To Selling Your Company | by Justin Kan | Justin Kan
- The Founder’s Guide to Selling Your Company
- What I've Learned from Hacker News
- Startups in 13 Sentences
- Why to Move to a Startup Hub
- How to Make Wealth
- Hackers and Painters: Big Ideas from the Computer Age: Graham, Paul: 9780596006624: Amazon.com: Books
- Apply to Y Combinator
- How to Apply to Y Combinator | Y Combinator
- ycombinator.com/apply/dropbox
- Lecture 3 - How to Start a Startup
- Paul Graham – Do Things That Don't Scale | Genius
- Sam Altman - How To Start A Startup - CS183B Lyrics and Tracklist | Genius
- Paul Graham – How to Get Startup Ideas | Genius
- How to Start a Startup
- Walker Williams – Lecture 8: Doing Things That Don't Scale, PR, and How to Get Started | Genius
- Startup Ideas: How the Best Founders Get Them and Why Novelty Is Overrated
- Startpage.com Search results
- Hype Cycle Research Methodology
- 5 Trends Appear on the Gartner Hype Cycle for Emerging Technologies, 2019 - Smarter With Gartner
- Why the Lean Start-Up Changes Everything
- Startpage.com Search results
- The Rise of ``Worse is Better''
- Rise of Worse Is Better
- Startpage.com Search results
- 7 Smart and Cool Compact Tables | Furniture for small spaces, Furniture, Small spaces
- Startpage.com Search results
- Unicorn (finance) - Wikipedia
- Five SpaceX Insights for Startups | Beta Solutions
- What it took for Elon Musk’s SpaceX to disrupt Boeing, leapfrog NASA, and become a serious space company — Quartz
- He's extremely smart and extremely hard-working; he has personally, aggressively... | Hacker News
- Home - First Round Capital
- How Design Thinking Transformed Airbnb from a Failing Startup to a Billion Dollar Business | First Round Review
- Want to Be a Billionaire? Solve a Billion-Person Problem | Inc.com
- Startpage.com Search results
- These Are the 4 Secrets to Replicating Stripe’s Billion Dollar Growth | Drift
- Startup Lessons: How Stripe Created A $35 Billion Giant
- The Collison Brothers and Story Behind The Founding Of Stripe | Startup Grind
- The Story Behind Payment Disruptor Stripe.com And Its Founder Patrick Collison | TechCrunch
- How Stripe Marketed to Developers So Effectively - GrowthHackers
- How Did Stripe Start and Challenge to PayPal? - Start Business Journey
- Why online payments start-up Stripe is the No. 1 Disruptor 50 company
- Elon Musk's 10 greatest inventions changing the world
Computer_Science
Algorithmics
Fundamentals
Recursion
- Bit Manipulation & Recursion: Dreadful combinat... - Love for Programming - Quora
Automata_Theory
- Generic Finite State Machine Revisited - CodeProject
- Toc - Algorithmist
- 7 algorithms and data structures every programmer must know - Coding Security
- algorithm - differences between time complexity and space complexity? - Stack Overflow
- Algorithms: A Top-Down Approach
- Planning Algorithms / Motion Planning
- ho/Ullman Foundations of Computer Science - academic course
- Dictionary of Algorithms and Data Structures
- Love for Programming - Quora
- The Art of Computer Programming by Knuth - Volume 1 Fundamental Algorithms
- CSC236: Introduction to the Theory of Computation - Fall 2015 - academic course - simple/complete/structural mathematical induction - algorithm correctness
- EECS 3101: Design and Analysis of Algorithms - academic course - algorithm correctness, iterative, recursive
- Data Structures and Advanced Programming - academic course
Information_Retrieval_Algorithms
Algorithmics
Algorithms_Correctness
- loop invariant at DuckDuckGo
- prove algorithm correctness at DuckDuckGo
- Loop invariant proofs must show three parts: at DuckDuckGo
- Loop invariant - Wikipedia
- Correctness (computer science) - Wikipedia
- Model checking - Wikipedia
- Verifying loops in C and C++ (intro) | David Crocker's Verification Blog
- Verifying loops: proving termination | David Crocker's Verification Blog
- Verifying loops – part 2 | David Crocker's Verification Blog
- What is the best way of determining a loop invariant? - Stack Overflow
- Precondition - Wikipedia
- Postcondition - Wikipedia
- Hoare logic - algorithm correctness algorithm
- Invariant (mathematics) - algorithm correctness proofs
- Correctness of recursive algorithms
- correctness proof - True Postcondition, with true Precondition - Computer Science Stack Exchange
- Newest 'correctness-proof' Questions - Computer Science Stack Exchange
- Program Verification - hoare logic - algorithm correctness - Halting Problem
- Loop invariants can give you coding superpowers - algorithm correctness
- Loop Invariant Proofs - General Strategies for finding loop invariants
- Loop Invariants on Demand
- Hoare Logic - Notation - Algorithm correctness
- An Axiomatic Basis for Computer Programming - hoare logic - algorithm correctness
- Program/Algorithm Correctness - loop/class invariant - functional/imperative program - recursion and induction - induction proof - axiomatics - Hoare logic, triple
- proof correctness recursive vs iterative algorithm at DuckDuckGo
- Recursive Algorithm Correctness (Continued) - induction
- Recursion and Loop Invariant
- lec08-loop-invariant - definitive iterative vs recursive algorithm correctness
- Iterative Algorithms - correctness
- Recursion and Induction - algorithm correctness
- algorithm - General proof strategies to show correctness of recursive functions? - Stack Overflow
- Prove correctness of recursive algorithm - Computer Science Stack Exchange
Algorithms_Paradigms-Design_Techniques
Dynamic_Programming
- Dynamic programming - Wikipedia
- Dynamic programming – Anna Kryvulya – Medium
- dynamic programming reconstruct best solution - Google Search
- Memoization or Tabulation approach for Dynamic programming - Stack Overflow
- What is the difference between memoization and dynamic programming? - Stack Overflow
- Problem Overview - Dynamic Programming 2 | Coursera
- Obtaining the actual steps of a solution that has been obtained using Dynamic Programming - Memoization, Backtracking
- How to reconstruct the actual optimal solution obtained using dynamic programming - Quora
- Category:Dynamic Programming - Algorithmist
- Dynamic Programming Tutorial - Contents
- GitHub - nobodyme/dynamic-programming: A tutorial aimed to give an understanding of common dynamic programming problems
- Dynamic Programming – From Novice to Advanced – topcoder
- Tutorial for Dynamic Programming | CodeChef
- Are there any good resources or tutorials for dynamic programming (DP), besides the TopCoder tutorial? - Quora
- algorithm - Good examples, articles, books for understanding dynamic programming - Stack Overflow
- Understanding Dynamic Programming. I can't seem to visualize it in my head. ELI5 please. : algorithms
- What are systematic ways to prepare for dynamic programming? - Quora
- algorithm - A simple example for someone who wants to understand Dynamic Programming - Stack Overflow
- TopCoder Forums
- The Algebraic Dynamic Programming Homepage
- lect1001.pdf
- dp_mat.dvi - dp_mat.pdf
- Dynamic Programming Practice Problems
- I don't understand dynamic programming. What should I do? - Quora
- Dynamic programming approaches - Anand
- top-down vs bottom up dynamic programming at DuckDuckGo
- Dynamic programming on whiteboard: top-down vs. bottom-up : cscareerquestions
- algorithm - Dynamic programming and memoization: bottom-up vs top-down approaches - Stack Overflow
- What is the difference between bottom up and top down dynamic programming method? - Quora
- algorithms - Top-down, Bottom-up Dynamic programming - Computer Science Stack Exchange
- recursion - Dynamic Programming - top-down vs bottom-up - Stack Overflow
- Top-down and bottom-up design - Wikipedia
- Tabulation vs Memoizatation - GeeksforGeeks
- Can every problem on Dynamic Programming be solved by both top-down and bottom-up approaches? - Quora
- Why is dynamic programming called dynamic programming? - Quora
- terminology - What is "dynamic" about dynamic programming? - Computer Science Stack Exchange
- Arcane Sentiment: Why “dynamic programming”?
- algorithms - Dynamic programming: speed of top down vs bottom up approaches - Computer Science Stack Exchange
- Dynamic Programming vs Divide-and-Conquer - definitive - memoization top-down vs tabulation bootom-up - definitive comparison
- Tabulation vs Memoization - dynamic programming
- algorithms - Is there a difference between top-down and bottom-up dynamic programming? recursion/recursive algorithm
- DEFINITIVE - If you could rename dynamic programming... - definitive origin of the term - multistage planning, frugal bottom-up recursion - tabular/tabulated recursion, splice and combine, overlapping-divide-and-conquer, smart recursion - alternative names - memoization = dynamic programming by accident - discussion, comparison
Data_Structures
- B-tree - Wikipedia
- Linked list - Linked lists vs. dynamic arrays vs balanced tree vs random access list vs hashed array tree complexity time
- Cracking the Coding Interview – Linked Lists – The Runner Technique | A Place For Poor Examples
- Linked List Data Structure - Basic Implementation - Singly/Doubly Linked List
- Deleting from a Linked List
- List of data structures - Wikipedia
- Abstract data type - ADT
- Stack (abstract data type) - ADT - LIFO
- Queue (abstract data type) - ADT - FIFO
- Double-ended queue - deque - head-tail queue - FIFO
- FIFO (computing and electronics) - First In First Out
- Trying to Understand Tries - basecs - Medium
- Self-balancing binary search tree - height-balanced BST - 2-3 tree AA tree AVL tree B-tree Red-black tree Scapegoat tree Splay tree Treap Weight-balanced tree
- Binary search tree - BST - ordered or sorted binary trees -
- Heap (data structure) - priority queues
- Set (abstract data type) - Wikipedia
- Associative array - map, symbol table, or dictionary - ADT - dictionary problem - hash table, search tree
- Heaps and Priority Queues in C++ - Part 1: Heaps Basics - STL make_heap
- Binary heap - binary tree - priority queue
- Priority queue - ADT
- Algorithms - ADUni
Computational_Complexity_Theory
- NP-completeness - Wikipedia
- Computational complexity theory - intractability - Wikipedia
- NP-hardness - Wikipedia
- Oracle machine - Wikipedia
- P versus NP problem - Wikipedia
- List of unsolved problems in computer science - Wikipedia
- NP-easy - Wikipedia
- Non-deterministic Turing machine - Wikipedia
- Turing machine - Wikipedia
- NTIME - Wikipedia
- NP-equivalent - Wikipedia
- NP-intermediate - Wikipedia
- NP (complexity) - Wikipedia
- The Status of the P Versus NP Problem | September 2009 | Communications of the ACM
- computer science - What are the differences between NP, NP-Complete and NP-Hard? NP-completeness definitive explanation - Stack Overflow
- EXPSPACE - Wikipedia
- Decision problem - Wikipedia
- Computability theory - automorphisms - reducibility - Wikipedia
- Church–Turing thesis - In computability theory, the Church–Turing thesis (also known as computability thesis,[1] the Turing–Church thesis,[2] the Church–Turing conjecture, Church's thesis, Church's conjecture, and Turing's thesis) is a hypothesis about the nature of computable functions
- Computable function - Turing machine
- complexity - Trying to understand P vs NP vs NP Complete vs NP Hard - Software Engineering Stack Exchange
- Reduction (recursion theory) - Turing reducibility
- What is the difference between NP-hard and NP-complete? definitive - decision vs optimization problem - oracle machine - Quora
- What is NP-hard and NP-complete? - Quora
- Optimization problem - Wikipedia
- Feasible region - In mathematical optimization, a feasible region, feasible set, search space, or solution space is the set of all possible points (sets of values of the choice variables) of an optimization problem that satisfy the problem's constraints, potentially including inequalities, equalities, and integer constraints.[1] This is the initial set of candidate solutions to the problem, before the set of candidates has been narrowed down.
- Is the prime factorization problem in NP class? If not, supposing P = NP, would RSA encryption and other such algorithms which rely on prime factorization being hard be rendered ineffective? complexity - Quora
- Complexity class - Wikipedia
- What are the consequences of factoring being NP-complete? prime factorization - NP vs co-NP - Theoretical Computer Science Stack Exchange
- Why isn't integer factorization in complexity P, when you can factorize n in O(√n) steps? trial factorization - Mathematics Stack Exchange
- Design and Analysis of Algorithms NP Hard and NP- Proofs - Complete Classes
- Computers and Intractability - Garey and Johnson book - Wikipedia
- Computational Complexity: A Conceptual Perspective [Goldreich]
- complexity theory - Is the prime factorization problem not an instance of the change making problem? - Computer Science Stack Exchange
- definitive in-depths explanation - What is the definition of $P$, $NP$, $NP$-complete and $NP$-hard? Decision problems - problem reductions, subroutines/oracles/black boxes - Computer Science Stack Exchange
- Beyond Computation: The P vs NP Problem - Michael Sipser - YouTube
- Pseudo-polynomial time - primality test - Wikipedia
- Determining complexity of an integer factorization algorithm - pseudo-plolynomial - Stack Overflow
- Time complexity - constant, logarithmic, polylogarithmic, sublinear, linear, quasilinear, sub-quadratic, strongly/weakly polynomial, superpolynomial, quasi-polynomial, sub-exponential, exponential, double exponential
- Primality test - cryptography - miller-rabin composite test - Wikipedia
- Composite number - primality test - integer/prime factorization - Wikipedia
- AKS primality test - also known as Agrawal–Kayal–Saxena primality test and cyclotomic AKS test
- Prime Factorization using Sieve O(log n) for multiple queries - GeeksforGeeks
- Prime factorization - OeisWiki
- Efficient program to print all prime factors of a given number
- elementary number theory - Algorithms for Finding the Prime Factorization of an Integer - Mathematics Stack Exchange
- Which is the fastest prime factorization algorithm to date? - Quora
- Integer factorization - prime factorization - primality test - cryptography, RSA - Wikipedia
- ti basic - Prime factorization program (TI-84+) - Stack Overflow
- integer/prime factorization algorithm - TI Calculator implementation in TI-BAISC
- Prime Factorization - factors, trees, cryptography application | Brilliant Math & Science Wiki
Resources
- GitHub - tayllan/awesome-algorithms: A curated list of awesome places to learn and/or practice algorithms.
- What are the best books on algorithms and data structures? - Quora
- GitHub - gzc/CLRS: Solutions to Introduction to Algorithms
- Brilliant | Math and science done right
- thyme/computer science at master · djtrack16/thyme · GitHub
Programming-Software_Engineering
Programming
Languages
Langage_Fundamentals
Serialization
- terminology - What is the difference between Serialization and Marshaling? serialization is a particlar instance/part of marshaling - remote procedure call RPC
- java - What is serialization? - Stack Overflow
- Serialization - Wikipedia
- Sigil (computer programming) - Wikipedia
- String interpolation - Wikipedia
Function_Hooking-Callbacks-Signals
- Hooking - Wikipedia
- What is the difference between hook and callback? - Stack Overflow
- Callback (computer programming) - Wikipedia
- Event (computing) - Wikipedia
- linux - Signals and interrupts a comparison - Stack Overflow
- Signal (IPC) - vs hardware exception
- What is the difference between signals, interruptions and exceptions? - Quora
- Signals and Delegates
Type_System
Type_Conversion
- Type conversion - Wikipedia
- Type punning - Wikipedia
- Type system - Wikipedia
- Type theory - Wikipedia
- Objects and Primitive Data
- Introduction to Static and Dynamic Typing — SitePoint
- What Every Computer Scientist Should Know About Floating-Point Arithmetic
- binary - How to tell if an integer is signed or not? - Stack Overflow
- Type signature - function prototype, overloading
- function hooking - Google Search
- why diamond inheritance is bad at DuckDuckGo
- multiple returns bad practice at DuckDuckGo
- Operator (computer programming) - Wikipedia
- terminology - What is the difference between a "function" and a "procedure"? - Stack Overflow
- programming practices - Method vs Function vs Procedure - Software Engineering Stack Exchange
- String (computer science) - Null-terminated - security concerns, code injection - Unicode, UTF-8/16/32
- Global variable - Wikipedia
C-Cpp_programming
C_programming
Standards
C11_std
- Introduction to C11 | Dr Dobb's
- C11 Standard - ISO/IEC 9899:201x - n1570.pdf
- C11 Standard - ISO/IEC 9899:201x - n1570 - Committee Official Draft
- c++ - Exotic architectures the standards committees care about - Stack Overflow
- List of platforms supported by the C standard - Stack Overflow
- language lawyer - Are there any non-twos-complement implementations of C? - Stack Overflow
- C POSIX library - Wikipedia
- C standard library - Wikipedia
- The GNU C Library - glibc
- Modern C - C11/C18 - jens gustedt
Memory_Model-Management_in_C
- Memory model - cppreference.com
- C dynamic memory allocation - Advantages/disadvantages to casting - security risk of stack smashing - malloc, free, dlmalloc - wild/dangling pointers - sbrk system call - hoard malloc - thread-catching malloc - OpenBSD malloc - FreeBSD/NetBSD jemalloc - In-Kernel malloc - realloc, calloc - malloc failure check
- Memory Allocation | Intel® Threading Building Blocks Documentation
- Memory Allocation
- A Memory Allocator - malloc standard implementation
- c - Do I cast the result of malloc? - Stack Overflow
- c - Why am I not getting a segfault error with this simple code? - Stack Overflow
- When is casting void pointer needed in C? %p format specifer, (u)intptr_t conversion - variadic function as printf -
- What's wrong with casting malloc's return value?
- malloc in C - cppreference.com
- _Alignof operator - cppreference.com
- C dynamic memory management library - cppreference.com
- free in C - cppreference.com
- c - Specifically, what's dangerous about casting the result of malloc? - Stack Overflow
- Memory Allocation - malloc, free
- casting - Why does "The C Programming Language" book say I must cast malloc? - Stack Overflow
- When do I need to cast the result of malloc in C language? - Stack Overflow
- programming - Is using malloc() and free() a really bad idea on Arduino? - memory fragmentation - setup() function - BSS segment
- Your Smartphone Has a Special Security Chip. Here’s How It Works - arm trust zone, samsung KNOX, firmware, Titan M
- malloc memory allocation scheme in C - memory alignment - fragmentation
- How Memory Allocation Affects Performance in Multi-Threaded Programs - malloc
- Objects and alignment in C- storage duration, lifetime, representation - strict aliasing - complete/effective type - struct padding to satisfy alignment requirements - alignof - trap representation - memcpy, memove -endiannes, little/big endian
References
- C Language FAQ - definitive reference
- Index of /~nsz/
- Main Page - C programming
- C11 standard - Rob's Programming Blog
Networking-Socket_Programming
- A complete Windows network programming (Winsock2) tutorials with C working code and program examples
- The Linux socket TCP/IP protocols network programming tutorials using open source GNU compiler with C language through working program examples and code samples on Linux client-server configuration
- A Windows socket/Winsock2 TCP/IP network programming tutorials using C language with illustrations with working client-server C program examples and C code samples
- sockets - Does listen() backlog affect established TCP connections? accecpt() - TCP socket
- Linux Network Programming - tcp listen() backlog - three way handshake - accept()
Misc
- c - Is errno thread-safe? POSIX requirement - -D_REENTRANT - Stack Overflow
Error-Exception_Handling
- errno in C - perror/strerror - thread-local- cppreference.com
- perror in C
- strerror, strerror_s, strerrorlen_s in C
- What is `perror` in C?
- c - When should I use perror("...") and fprintf(stderr, "...")? - Stack Overflow
- Error handling - errno_t, rsize_t, RSIZE_MAX - static_assert/assert
- The problem with strerror_r() - improvement
- Error numbers - errno macros - EDOM, EILSEQ, ERANGE
- ERR30-C. Set errno to zero before calling a library function known to set errno, and check errno only after the function returns a value indicating failure - secure coding - in band / out of band error indicator
- linux - How to install man pages for C standard library functions in Ubuntu? linux manual libc - install manpages-dev, manpages-posix-dev, glibc-doc, glibc-doc-reference
Multithreading-Concurrent_Prorgamming
- c++ - Why can't I use strerror? strerror_r() vs C11 strerror_s() - thread safety
- Avoid race conditions when using library functions - - thread safety - secure coding - rand(), srand(), Do not use the rand() PRNG - getenv(), getenv_s() - strtok(), strtok_s() in C11 Annex K strtok_r() in POSIX - strerror(), strerror_s() in C11 Annex K strerror_r() in POSIX - asctime(), ctime(), localtime(), gmtime() asctime_s(), ctime_s(), localtime_s(), gmtime_s() in C11 Annex K setlocale() - ATOMIC_VAR_INIT, atomic_init() - tmpnam(), tmpnam_s() in C11 Annex K - tmpnam_r() in POSIX mbrtoc16(), c16rtomb(), mbrtoc32(), c32rtomb(), mbstate_t - data race - re-entrancy, re-entrant functions - errno
- The Definitive C Book Guide and List - Stack Overflow
- Win32 x86 Calling Conventions - CodeProject
- c - Implementation of __builtin_clz - Stack Overflow
- GitHub - stevefan1999/TinyGenericC: Tiny C Libraries that exploits undefined behaviors to achieve generic programming
- Security-Oriented C « Null Byte :: WonderHowTo
- C (programming language) - Wikipedia
- GNU C Library - glibc, fork of linux libc - The GNU C Library project provides the core libraries for the GNU system and GNU/Linux systems, as well as many other systems that use Linux as the kernel. These libraries provide critical APIs including ISO C11, POSIX.1-2008, BSD, OS-specific APIs and more. These APIs include such foundational facilities as open, read, write, malloc, printf, getaddrinfo, dlopen, pthread_create, crypt, login, exit and more - Embedded systems
- Gnulib - Wikipedia
- Glibc and static linking [LWN.net]
Coding_Standards-Styles
- On goto statement relevance - coding styles/standards, best practices BCP
- Should I use symbolic names like TRUE and FALSE for Boolean constants, or plain 1 and 0? coding style/standard
- Linux kernel coding style - coding standards — The Linux Kernel documentation - ideal indentation - definitive
- Where can I get the ``Indian Hill Style Guide'' and other coding standards? - coding styles/standards, best practices BCP
- Is it acceptable for one header file to #include another? nested include files - coding styles/standards, best practices BCP
- ioctl - input/output control - system call for device-specific input/output operations and other operations which cannot be expressed by regular system calls - - fcntl, ipfw, setsockopt - IPC - security, userspace, buffer overflow
Cpp_programming
References
- Sutter’s Mill | Herb Sutter on software development
- Bjarne Stroustrup's Homepage
- ISO Standard C++
- C++ FAQ
- Modern C++ for C programmers—bert hubert : Standard C++
- c++ faq - The Definitive C++ Book Guide and List - Stack Overflow
- Stroustrup: C++ Style and Technique FAQ
- Fluent C++ - Jonathan Boccara's blog
- Linux C++ Software Development - endianness/byte order conversion,
Boost_Framework
- beast boost c++ at DuckDuckGo
Qt_Programming
- Signals & Slots | Qt 4.8
- Using the Meta-Object Compiler (moc) | Qt 4.8
- Signals and slots - Wikipedia
- c++ - Qt events and signal/slots - Stack Overflow
Coding_Standards
- CppCoreGuidelines/CppCoreGuidelines.md - RAII
- isocpp/CppCoreGuidelines: The C++ Core Guidelines are a set of tried-and-true guidelines, rules, and best practices about coding in C++
- Some C++ good practices from the OpenCV source code – CppDepend Blog
Memory_Model-Management_in_Cpp
Pointers_VS_References
- c++ - Reference to a pointer - Stack Overflow
- c++ - warning: returning reference to temporary - Stack Overflow
- c++ - Pointer vs. Reference - Stack Overflow
- c++ - Pointer to reference - Stack Overflow
- c++ - Difference between pointer to a reference and reference to a pointer - Stack Overflow
- c++ - difference between a pointer and reference parameter? - Stack Overflow
- Passing references to pointers in C++ - Stack Overflow
- What are the differences between a pointer variable and a reference variable in C++? - Stack Overflow
- c++ - Pointer vs. Reference - Stack Overflow
- Pointers vs References in C++ - GeeksforGeeks
- c++ - About pointer and reference syntax - Stack Overflow
- c++ - When to use references vs. pointers - Stack Overflow
- Passing Reference to a Pointer in C++ - GeeksforGeeks
- c++ - Does a const reference class member prolong the life of a temporary? vs const local references - Stack Overflow
- c++ - Why not non-const reference to temporary objects? - Stack Overflow
- c++ - Returning temporary object and binding to const reference - definitive succint answer -Stack Overflow
Multi-Threading_with_SL
- C++11 Multithreading – Part 1 : Three Different ways to Create Threads – thisPointer.com
- C++ Memory model - cppreference.com
- Dynamic memory management - cppreference.com
- What is memory fragmentation? - Stack Overflow
- make_shared c++ fragmented memory - Google Search
- make_shared c++ advatanges drawbacks - Google Search
- c++ - RAII vs. Garbage Collector - Stack Overflow
- Modern C++ isn't memory safe, either
- We make any object thread-safe - CodeProject
- Asynchronous Multicast Delegates in C++ - CodeProject
- Thread Wrapper for Modern C++ - CodeProject
- We make a std::shared_mutex 10 times faster - CodeProject
- C++/WinRT: Understanding Async | Kenny Kerr
- c++ - Memory Allocation/Deallocation? - Stack Overflow
- C++: Memory allocators - Stack Overflow
- What are static and dynamic binding in C (strictly C,not C++)? - Stack Overflow
- multithreading - C++11 introduced a standardized memory model. What does it mean? And how is it going to affect C++ programming? - Stack Overflow
Objects_Construction_Destruction
- Why the Destructor in C++ de-allocated memory in reverse order of how they were initialised? - Stack Overflow
- c++ - Why does the order of destruction for data member matter? - Stack Overflow
- exception - Object destruction in C++ - definitive answer - local/non-local/namespace static variables, scoped/dynamic object - Order of construction/destruction - Stack Overflow
- c++ - Do class functions/variables have to be declared before being used? definitive - class definition layout - coding standard - Stack Overflow
- c++ - Why is the 'Declare before use' rule not required inside a class? class definition layout - coding standard - Stack Overflow
- c++ - What is The Rule of Three? rule of five - rule of zero - Stack Overflow
- Copy constructor (C++) - Wikipedia
- Default constructors - cppreference.com
- Copy constructors - default - cppreference.com
- Move constructors - default - cppreference.com
- Destructors - default - cppreference.com
- Move assignment operator - default - cppreference.com
- Copy assignment operator - default - cppreference.com
- c++ - Rule-of-Three becomes Rule-of-Five with C++11? - Stack Overflow
- Rule of Zero - three - five @ Flaming Dangerzone
- constructor - C++ default destructor - Stack Overflow
- c++ - The new keyword =default in C++11 - aggregate, POD - trivial/non-trivial -constexpr - Stack Overflow
- Memory Management - memory leaks - C++ FAQ
- std::malloc in C++ - cppreference.com
- Object in C++ - Object representation and value representation - Subobjects - Polymorphic objects - Strict aliasing - Alignment requirements
- What is Heap Fragmentation? | C++ for Arduino
- Strategies for the Allocation of Memory - dynamic/static allocation - fragmentation - new/delete operators - memory pool
Types
- c++ - Regular cast vs. static_cast vs. dynamic_cast - Stack Overflow
- Why does C++ require a cast for malloc() but C doesn't? - Stack Overflow
- language features - Why aren't `void *`'s implicitly cast in C++? - Software Engineering Stack Exchange
Constant_Methods
- c++ - Why using the const keyword before and after method or function name? - Stack Overflow
- c++ - When should static_cast, dynamic_cast, const_cast and reinterpret_cast be used? - Stack Overflow
- Explicit type conversion in C++
- std::underlying_type - cppreference.com
- Enumeration declaration - cppreference.com
- c++ - How to automatically convert strongly typed enum into int? - Stack Overflow
- Which variables should I typecast when doing math operations in C/C++? type conversion - typecasting one operand - Rules/ANSI C Rules compilers follow when dealing with typecast - overflow - definitive answer - Stack Overflow
Runtime_Considerations
- C++ RTTI Viable Examples - Stack Overflow
- stackoverflow.com/questions/5062220/does-rtti-mean-dynamic-binding
- RTTI and security - cpp
- stackoverflow.com/questions/11332075/comparing-polymorphic-base-types-in-c-without-rtti
- RTTI (Run-time type Information) in C++ - GeeksforGeeks
- Can RTTI cause security issues on certain platforms? - Stack Overflow
- How expensive is RTTI? - Stack Overflow
Network_Programming
Boost_Asio
- Basic Boost.Asio Anatomy - 1.65.1
- c++ - io_service, why and how is it used? - Stack Overflow
- https://github.com/fffaraz/awesome-cpp#networking
- Mocking socket calls in C++ - Code Review Stack Exchange
- Unit testing Client/Server App in C++ - Stack Overflow
C++17
- The C++ Standard Library: The Second Edition includes C++17 - grimm-jaud.de
- Modern C++ CI | Juan Medina Personal Blog
- Towards a more powerful and simpler C++ with Herb Sutter | CLion Blog
- C++17 Final Standard Is Now Official
- C++17 - Wikipedia
- C++ : Get the list of all files in a given directory and its sub-directories using Boost & C++17 – thisPointer.com
Template_Metaprogramming
- “Modern C++ Template Programming” with Nicolai Josuttis : Standard C++
- Template metaprogramming - Wikipedia
- Expressive C++ Template Metaprogramming - Fluent C++
- typename - Wikipedia
- c++ - Officially, what is typename for? - Stack Overflow
- C++ keywords: typename - cppreference.com
- Parameter pack(since C++11) - variadic template - cppreference.com
Containers
- C++: C-Style arrays vs. std::array vs. std::vector
- std::array - C-Style Native Arrays
- C++ Core Guidelines: std::array and std::vector are your Friends - definitive comparison
- c++ - std::array vs array performance - Stack Overflow
- Containers library - Thread Safety - sequence/associative/unordered associative containers
- std::vector - vector<bool> space-efficient dynamic bitset
- c++ - 'size_t' vs 'container::size_type' - Stack Overflow
- std::unordered_map - cppreference.com
- What's the C++ version of Java's ArrayList - std::vector
- Data structures and algorithms problems in C++ using STL
- String Concatenation in C++ Done the Right Way
- The Complete Guide to Building Strings In C++: From "Hello World" Up To Boost Karma - definitive
- c++ - std::stringstream vs std::string for concatenating many strings - concatenation, formatting
- 4350% Performance Improvement with the StringBuilder for C++! - CodeProject
- String concatenation time complexity c++ - Stack Overflow
- String concatenation complexity in C++ and Java - time complexity
- std::forward_list - cppreference.com
- std::begin, std::cbegin - cppreference.com
- A Comprehensive Guide To Singly Linked List Using C++ | Codementor
- C++ : Different Ways to iterate over a List of objects – thispointer.com
- c++ - Iterator invalidation rules - erase_after forward_list
- c++ - How get next (previous) element in std::list without incrementing (decrementing) iterator? - Stack Overflow
- c++ - New iterator requirements - Stack Overflow
- Printing out contents of a list from the c++ list library - Stack Overflow
- pointers - Can I check a C++ iterator against null? - end()
- std::next - cppreference.com
- std::forward_list<T,Allocator>::erase_after - delete list node
- c++ - What is an iterator in general? - Stack Overflow
- c++ - Can you remove elements from a std::list while iterating through it? erase - for loop - troubleshoot
- c++ - Subclass/inherit standard containers? - inheritance - design choice
- How check if a given key exists in a Map | C++ – thispointer.com
- c++ - Is there any advantage of using map over unordered_map in case of trivial keys? - Stack Overflow
- Choosing the Right Container: Associative Containers — Embedded Artistry
- Set vs Map : How to choose a right associative container ? – thispointer.com
- map vs. unordered_map in C++ - binary balanced tree - red/black tree - hash_map - definitive comparison - implementations
- std::hash - cppreference.com
- std::stack - cppreference.com
- C++ STL stack question: Why does pop() not throw an exception if the stack is empty? - Stack Overflow
- std::deque - cppreference.com
- Standard Template Library - STL containers list
- Associative containers in C++ STL - std::set, map, multiset, multimap
- Unordered associative containers (C++) - definitive - code examples - std::unordered_map - STL - custom hash function template specialization
- Lookup table - hash tables, hash fucntion - bitwise operations examples
- Treap - Wikipedia
- C++ Standard Library - STL
- Sequence container (C++) - list, forward_list, deque, array - vector specialization for bool bit field
- Hash-Based Sets and Maps - unordered
Pointers_VS_References
- How is reference implemented internally? - Stack Overflow
- How references are internally stored in c++? - Stack Overflow
Design_Patterns_in_Cpp
- work stealing pattern c++ at DuckDuckGo
- performance - Why are template mixins in C++ not more of a mainstay? - Stack Overflow
- Mixin Classes: The Yang of the CRTP - Curiously Recurring Template Pattern - Fluent C++
- Perfect Singleton in C++11
- C++ way of dependency injection - Templates or virtual methods? - Stack Overflow
- c++ - Why prefer template method over dependency injection? - Stack Overflow
- dependency injection : Standard C++
- AspectC++ - Wikipedia
- c# - Is dependency injection useful in C++ - Stack Overflow
- Use your singletons wisely
- c++ - How is Meyers' implementation of a Singleton actually a Singleton - Stack Overflow
- c++ - Is Meyers' implementation of the Singleton pattern thread safe? - local static initilization - Stack Overflow
- c++11 - Singleton class and correct way to access it in C++ - Code Review Stack Exchange
- c++ - Use of deleted copy constructor in the singleton - Stack Overflow
- C++ Singleton design pattern - heap alocation - memory leak - Meyer's Singleton - Stack Overflow
- Thread-Safe Initialization of a Singleton - ModernesCpp.com
- c++ - Use of deleted copy constructor in the singleton - Stack Overflow
Misc
- Should I use noexcept for getters always? - Stack Overflow
- noexcept practice for style and performance? - Stack Overflow
- A beginner’s look at smart pointers in modern C++ : Standard C++
- When and why do I need to use cin.ignore() in C++? - Stack Overflow
- When to Use Enums and When to Use Tag Dispatching in C++—Jonathan Boccara : Standard C++
- Your handy cut-out-and-keep guide to std::forward and std::move - Sticky Bits
- How to Use Tag Dispatching In Your Code Effectively - Fluent C++
- What's the difference between "STL" and "C++ Standard Library"? - Stack Overflow
- c++ - What is the difference between the standard library and the standard template library? - STL vs SL - Stack Overflow
- Array initialization use const variable in C++ - Stack Overflow
- c++ - Why should I not #include <bits/stdc++.h>? - Stack Overflow
- c++ - *.h or *.hpp for your class definitions - Stack Overflow
- filenames - C++ code file extension? .cc vs .cpp - Stack Overflow
- c++ - .c vs .cc vs. .cpp vs .hpp vs .h vs .cxx - Stack Overflow
- c++ - What is the meaning of prepended double colon "::"? namespace resolution
- Unqualified name lookup - name that does not appear to the right of a scope resolution operator :: - namespace
- Argument-dependent name lookup - ADL - argument-dependent name lookup- Koenig Lookup - namespaces, scope resolution operator :: double column
Input-Output
- Input/output via iostream and cstdio - std::cin - std::endl vs \n - friend stream insertion operator << - encapsulation violation and friend keyword - istream conversion to boolean in while (std::cin >> foo)
- stdin - How to read n integers from standard input in C++? definitive methods to read user input
- c++ - Best way to get ints from a string with whitespace? - Stack Overflow
- reading unknown number of integers from stdin (C) - Stack Overflow
- std::cin, std::wcin - cppreference.com
- c++ - What does flushing the buffer mean? - Stack Overflow
- What does buffer flush means in C++ ? - GeeksforGeeks
- std::endl - cppreference.com
- coding style - C++: "std::endl" vs "\n" - Stack Overflow
- How to split a string in C++ - Fluent C++
- std::getline - delimiter char, split string, tokenize
- std::basic_istringstream - cppreference.com
- Read file line by line using ifstream in C++ - tokenization, line/token based input reading
- std::to_string - integer to ascii itoa()
- c++ - Conditional operator used in cout statement - inline if precedence in cout statement
- fflush in C
- c - How can you flush a write using a file descriptor? - Stack Overflow
- c++ - How can fopen_s be more safe than fopen? C11 Annex K
- FIO03-C. Do not make assumptions about fopen() and file creation - fopen_s() C11 - secure coding
- What are copy elision and return value optimization? RVO - Stack Overflow
Object_Oriented_Concepts
- Static class equivalent in C++ - namespace
- Are utility classes with nothing but static members an anti-pattern in C++? - Software Engineering Stack Exchange
- Why would one use nested classes in C++? - definitive - PIMPL Idiom - Scoping - Non polluting namespace
- nested classes - cppreference.com
Language_Core
- for loop - cppreference.com
- while loop - cppreference.com
- The Expressive C++17 Coding Challenge (in Rust)
- What's the closest thing in C++ to retroactively defining a superclass of a defined class? - Stack Overflow
- How to create a loading bar in c++ - Coding Security
- Metaclasses, the Ultimate Answer to Strong Typing in C++? - Fluent C++
- GitHub - SaadAhmad/in_constexpr: An approach for runtime detection inside a constexpr function
- Why you should really care about C/C++ static analysis
- Interactive Workflows for C++ with Jupyter – Jupyter Blog
- Assertion dans les fonctions constexpr
- Exception handling in constructors – Cpp-Station – Medium
- Units and measures for C++ 11 - CodeProject
- Improving compile times of C++ code
- c++ - What is the easiest way to initialize a std::vector with hardcoded elements? - Stack Overflow
- GitHub - OculusVR/Flicks: A unit of time defined in C++.
- cppdepend.com/blog/?p=294&utm_content=buffer90b4d&utm_medium=social&utm_source=facebook.com&utm_campaign=buffer
- Minimizing <windows.h> · Aras' website
- A Flexible Reflection System in C++: Part 2
- foonathan::blog() - Guidelines for constructor and cast design
- On the state of cross-compilation in the C++ World – Corentin – Medium
- Bartek's coding blog: What happens to your static variables at the start of the program?
- The 15 C++11 features you must really use in your C++ projects. – CppDepend Blog
- Lvalues, rvalues and their references - Fluent C++
- Common misconception with C++ move semantics – Page Fault Blog
- Understanding C/C++ Code Behavior by Analyzing Assembler Output - CodeProject
- Modern C++: 7 Ways to Fake It Until You Have It—Jonathan Boccara : Standard C++
- C++ : How to read or write objects in file | Serializing & Deserializing Objects – thispointer.com
- La sérialisation avec Boost
- Serialization
- operator overloading - cppreference.com
- inline specifier in C++ - cppreference.com
- Why assignment operator return by reference and not by value - C++ Forum
- Non-static member functions - cppreference.com
- Default comparisons(since C++20) - default - cppreference.com
Optimization-Performance
- Doing a lot of mathematical calculations fast and accurately — Mathieu Bouville, PhD
- Inheritance — dynamic binding, virtual functions C++ FAQ
- Answer - Quora
- Need for Speed - C++ versus Assembly Language - CodeProject
- Does software performance still matter? – Daniel Lemire's blog
- Do Understandable If Statements Run Slower? - Fluent C++
- How to Optimize Compilation Times with Precompiled Headers (PCH Files) - CodeProject
- assembly - Why doesn't GCC optimize a*a*a*a*a*a to (a*a*a)*(a*a*a)? - Stack Overflow
- c++ - Replacing a 32-bit loop count variable with 64-bit introduces crazy performance deviations - Stack Overflow
- c++ - Boolean values as 8 bit in compilers. Are operations on them inefficient? - Stack Overflow
- Optimizing software in C++ - optimizing_cpp.pdf
- Software optimization resources. C++ and assembly. Windows, Linux, BSD, Mac OS X
- Loop unrolling - Optimization
Misc
Peculiar_Behaviors
- Unspecified, undefined and implementation defined behavior WIKI for C - UsB vs UB vs IDB - definitive definitions, comparison
- GitHub - stevefan1999-personal/TinyGenericC: Tiny C Libraries that exploits undefined behaviors to achieve generic programming
- c++ - What exactly do "IB" and "UB" mean? - Undefined Behavior
- LLVM Project Blog: What Every C Programmer Should Know About Undefined Behavior #1/3
- A Guide to Undefined Behavior in C and C++, Part 1 – security risk - secure coding
- Undefined behavior - cppreference.com
- Undefined behavior - integer overflow, side effects - sequence points - increment operator - CHAR_BIT, bitwise operators, shifting by negative number
- Undefined behavior in C
- Undefined Behavior and Fermat’s Last Theorem
Function_Calls-Functions_Pointers
- C Function Pointers Alternate Syntax - Nick Desaulniers
- Function pointer - functors, method pointers
- c - What is the difference between Function Pointer vs Function Call? - asynchronous mechanism
- c++ - Get pointer to node in std::list or std::forward_list - Stack Overflow
- c++ - what is the difference between function declaration and signature? - Stack Overflow
- c++ - Calling a function through a function pointer - dereference the pointer or not? What's the difference? function pointer vs function call - definitive answer - chained dereferencing - function name/designator decays to function pointer
Memory_Management_in_C-Cpp
- how is the heap shared between processes at DuckDuckGo
- Is heap memory per-process? (or) Common memory location shared by different processes? - Stack Overflow
Data_Representation
sizeof_operator
- sizeof operator in C++ - cppreference.com
- sizeof - platform ABI, compiler
- c++ - Is the sizeof(some pointer) always equal to four? - Stack Overflow
- c - sizeof style: sizeof(type) or sizeof variable? - Software Engineering Stack Exchange
- The C Book — Sizeof and storage allocation
- how is sizeof operator implemented c - Recherche Google
- Implement Your Own sizeof - GeeksforGeeks
- c - implementation of sizeof operator - Stack Overflow
- c - Why is it safer to use sizeof(*pointer) in malloc - definitive anwer - Stack Overflow
- sizeof operator in C - CHAR_BIT
- c - Is the operand of `sizeof` evaluated with a VLA? - Stack Overflow
- c - Confusion with malloc - sizeof
- runtime - Is sizeof in C++ evaluated at compilation time or run time? - Stack Overflow
- c++ - sizeof operator compile-time or run-time - C99 VLAs
- c - Sizeof operator Implementation : How it computes size at compile time? - C99/C11 variable length arrays - ABI platform specifications - compiler
- c - Why is sizeof considered an operator? - Stack Overflow
- c - How sizeof(array) works at runtime? - VLAs - definitive answer
- Data Models and Word Size - Nick Desaulniers
- int - In C storing values that start with zero get mutated, why? - Stack Overflow
- c - Pointer representation - Stack Overflow
- floating point - How to represent FLOAT number in memory in C - Stack Overflow
- c - Can anyone explain representation of float in memory? - Software Engineering Stack Exchange
- c - How are floating point numbers are stored in memory? - Stack Overflow
- c - Are all pointers derived from pointers to structure types the same? - Stack Overflow
- c++ - std::size_t vs size_t vs std::string::size_type - Stack Overflow
- c++ - When is uint8_t ≠ unsigned char? - Stack Overflow
- c++ - Difference between uint8_t, uint_fast8_t and uint_least8_t - Stack Overflow
- c - Is there any reason not to use fixed width integer types (e.g. uint8_t)? - Stack Overflow
- c++ - uint8_t VS uint32_t different behaviour - Stack Overflow
- c++ - What is the size of a pointer? - Stack Overflow
- c - Using long long integer to store 32 bit pointer causes printf to bug - Stack Overflow
- Seriously, have any actual machines really used nonzero null pointers, or different representations for pointers to different types? memory model, internal representation, bit patterns
- interchangeability of char* and void* as they share same size, representation and memory alignment
- c - Issue with NULL pointers on Harvard Architecture platform - code addresses, data addresses representation, size
Data_Alignment
- gcc - C undefined behavior. Strict aliasing rule, or incorrect alignment? - Stack Overflow
- c - Data Alignment with network programming - Stack Overflow
- macros - How to do data alignment in C? - Stack Overflow
- The advantage of using __attribute__((aligned( ))) - compiler attributes - Software Engineering Stack Exchange
- c++ - what is "stack alignment"? - Stack Overflow
- c - Stack allocation, padding, and alignment - Stack Overflow
- Coding for Performance: Data alignment and structures | Intel® Software
- The Lost Art of Structure Packing - reducing memory waste - alignment, padding
- Alignment in C - performance - consequence of misalignment - data structure alignment - padding - SSE, SIMD and 16 bytes boundaries - stack alignment - trade off between memory waste and performance - minimize memory waste by padding
Pointer_Arithmetics
Arrays_VS_Pointers
- why is char array not modifiable in c at DuckDuckGo
- Why array type object is not modifiable? - Stack Overflow
- c - Difference between dereferencing pointer and accessing array elements - Stack Overflow
- c - What is the difference between char s[] and char *s? - Stack Overflow
- c - Character String Pointer vs. Array - Stack Overflow
- c - Efficiency: arrays vs pointers - Stack Overflow
- C: differences between char pointer and array - definitive answer - Stack Overflow
- C pointer to array/array of pointers disambiguation - Stack Overflow
- c++ - Dereferencing a pointer to an array? - Stack Overflow
- c - Can we change the base address of an array through a pointer to array using brute force? - Stack Overflow
- c - Cannot modify char array - Stack Overflow
- c++ - Pointer to const char vs char array vs std::string - definitive
- Difference between const char *p, char * const p and const char * const p - GeeksforGeeks
- c++ - Difference between char pointer and char array - Stack Overflow
- c - typcasting a character array to a const char * - Stack Overflow
- What's difference between char s[] and char *s in C? - GeeksforGeeks
- What is the difference between char array vs char pointer in C? definitive answer - Stack Overflow
- c - char *array and char array[] - Stack Overflow
- c - What is the difference between char s[] and char *s? - Stack Overflow
- c - With arrays, why is it the case that a[5] == 5[a]? - Stack Overflow
- c - Why do I get a segmentation fault when writing to a string initialized with "char *s" but not "char s[]"? array vs pointer - defitive answer - Stack Overflow
- C strings pointer vs. arrays - Stack Overflow
- Arrays and Pointers in C- definitive - cfaq
- array vs pointer - definitive answer
- But I heard that char a[] was identical to char *a.
- So what is meant by the ``equivalence of pointers and arrays'' in C? pointer arithmetic and array indexing are equivalent in C, pointers and arrays are different - Definitive breakdown - decay of array into pointer, three exceptions
- Since array references decay into pointers, if arr is an array, what's the difference between arr and &arr? definitive insight - type of addresss of array object
- Practical difference between array and pointer - definitive
- But I heard that char a[] was identical to char *a - char array vs pointer array - definitive comparison
- I'm still mystified. Is a pointer a kind of array, or is an array a kind of pointer?
- Why does some code carefully cast the values returned by malloc to the pointer type being allocated? Casting return of malloc - void pointer
- c - Changing static array - Stack Overflow
- c - Why local strings declared into the main function is part of Rodata segment memory? - static storage duration, string literals - definitive array vs pointer - literal copied onto stack space for array - memcpy - .LC0
- DEFINITIVE - Pointers to arrays in C - array decay into pointers
- c - Segmentation fault reversing a string literal - Stack Overflow
- Why is this string reversal C code causing a segmentation fault? - array vs pointer -
- Dangling, Void , Null and Wild Pointers - GeeksforGeeks
- Dangling pointer - Wikipedia
- wild pointer c - Google Search
- const-ptrs.c
- c++ - Why don't I get a segmentation fault when I write beyond the end of an array? - Stack Overflow
- What exactly is a C pointer if not a memory address? - Stack Overflow
- To what extent is it acceptable to think of C++ pointers as memory addresses? - Stack Overflow
- Pointer implementation details in C - Stack Overflow
- c++ - What does "dereferencing" a pointer mean? - Stack Overflow
- c++ - How does dereferencing of a function pointer happen? - Stack Overflow
- Pointer arithmetic for void pointer in C - definitive - GCC C Extension -
- Addition of two pointers in c or c++ not supported. why? Pointer arithmetics - pointer addition forbidden while substraction allowed - cast to (u)intptr_t for addition - Stack Overflow
- Null pointer - NULL, (void*) 0, nullptr - Dereferencing - Non mapped memory, segfault - vs memory address 0 - BIOS code - Undefined/Undesired Behavior -
- c++ - Why can't you do bitwise operations on pointer in C, and is there a way around this? uintptr_t - Undefined Behavior, Implementation-Defined Behavior - Stack Overflow
- c++ - What is the use of intptr_t? Memory Management Code - Stack Overflow
- c - When is uintptr_t preferred over intptr_t? void* vs (u)intptr_t definitive comparison with examples - bitwise operation on pointers - intptr_t vs uintptr_t - flat virtual address space - CPUs DSP, CRAY Y-MP
- Top 20 C pointer mistakes and how to fix them - secure coding
Null_Pointers
- Null Pointers - C FAQ
- c - What is the difference between a pointer pointing to 0x0 location and a pointer set to NULL? (void*)0, null pointer vs null pointer constant syntactic sugar - - Software Engineering Stack Exchange
- What is this infamous null pointer, anyway?
- If NULL and 0 are equivalent as null pointer constants, which should I use?
- Null Pointers
- What is this infamous null pointer, anyway? Compiler internal representation of null pointer constants for different pointer types
- null pointer vs null pointer constant - 0 zero VS NULL macro - execl function null terminated call example - cast for variadic functions -
- c - Is (int *)0 a null pointer? null pointer vs null pointer constant - definitive explanation - C vs C++
- Pointer comparison with zero - Internal representation of null pointer - coding styles/standards, best practices
- How should NULL be defined on a machine which uses a nonzero bit pattern as the internal representation of a null pointer? bit pattern generated for pointer representation by compiler - NULL vs 0 zero integer constant expression
- definitive breakdown - null pointer constant 0 vs NULL macro vs NUL vs null string - This is strange. NULL is guaranteed to be 0, but the null pointer is not? internal representation bit pattern generation by compilers, transparent to C program writers
- NUL vs. NULL - mnemonic poetry
- If NULL and unadorned 0 are equivalent as null pointer constants, which should I use? NULL and 0 are interchangeable in pointer contexts, and uncast 0 is perfectly acceptable
- But wouldn't it be better to use NULL (rather than 0), in case the value of NULL changes, perhaps on a machine with nonzero internal null pointers? internal representation generation, coding style
- My vendor provides header files that #define NULL as 0L -
- What is the NULL macro and how is it defined? 0 or ((void *)0)
- NULL macro implementation in C - The macro NULL is an implementation-defined null pointer constant - Cast vs uncast 0 - C++ compatibility
- Definitive historical reason of casting unadorned 0 to void* in NULL macro When was the NULL macro not 0? - definitive on casting to void* - C vs C++ - nullptr/nullptr_t -
- Don’t use NULL – Jens Gustedt's Blog
- definitive argument against NULL macro - Possible implementation of NULL macro - null pointer constant - NULL considered harmful - C vs C++ - NULL considered harmful - 0L - having type void * instead of char * would not matter when calling execl. Arguably it may not matter anyway, since C specified that char * and void * have the same internal representation and memory alignment - NULL as sentinel argument for variadic functions - ABI, calling conventions, breaking stack layout - arg slot - _null
- c - Ways a program might detect whether NULL macro is defined with integer or pointer type? - Stack Overflow
- c - Are there reasons to assign NULL instead of 0 to non-pointer variables? - nullptr
- Pointer declaration in C - to void, null pointer values of each pointer type - free - strict aliasing - pointers to functions/objects - flat memory model/virtual address space -
- Pointer (computer programming) - PAE 36 bit paging to 32 bits, paging - C Arrays indexing, pointer arithmetics, dereference - dangling/back pointers, wild branch - void * - function pointer - dynamic memory allocation malloc - Memory-mapped hardware embedded systems
- Dereference operator - Wikipedia
- c - access element of struct passed into a void* pointer - dereferencing
- Address arithmetic - pointer
- AMD64 = x86-64/Intel 64/EM64T/x64 - definitive
- C - Why cast to uintptr_t vs char* when doing pointer arithmetic - portability - definitive - gcc extension void pointer arithmetic -
- What happens when a casted pointer has an increment operator? definitive - rvalue, lvalue, temporary object - Only lvalues can be incremented - pointer internal representation
- c - What is intptr_t,is it a type for integer or pointer? - Stack Overflow
Array_subtleties-Indexing
- arrays - Why does the indexing start with zero in 'C'? - Stack Overflow
- Why do array indexes start with 0 (zero) in many programming languages? - Quora
- Why are zero-based arrays the norm? - Software Engineering Stack Exchange
- Why do we use arrays instead of other data structures? - Stack Overflow
- c++ - Accessing an array out of bounds gives no error, why? - Stack Overflow
- c++ - Reverse iteration with an unsigned loop variable - Stack Overflow
- c++ - When should I use std::size_t? - Stack Overflow
- Wrap around explanation for signed and unsigned variables in C? - Stack Overflow
- [cppx] How to avoid disastrous integer wrap-around | Alf on programming (mostly C++)
- What is the "-->" operator in C++? - Stack Overflow
- Array declaration in C- Array to Pointer implicit conversion - Multidimensional arrays - VLAs variable length arrays
- What's so bad about VLAs Variable Length Arrays? : cpp
- c - What's the point of VLA anyway? Variable Length Arrays
- Variable-length array - VLAs
- Can a const variable be used to declare the size of an array in C? VLAs Variable Length/Runtime Bounded Arrays - static const, constexpr
- c - Is alloca() completely replaceable? - VLAs
- Waiter! There's a VLA in my C!
- Variable Length Arrays - VLAs - definitive standard specification
- DEFINITIVE - Why aren't variable-length arrays VLAs part of the C++ standard? code safety - memory, stack alignement - std::vector custom stack allocator - alloca() - sizeof compile time/runtime - discussion, criticism
- 'memory-leaks' tag wiki - Stack Overflow
- Memory Allocators 101 | James Golick
- Memory allocation - Rosetta Code
- c - Addressable memory unit - Software Engineering Stack Exchange
- memory management - What and where are the stack and heap? - Stack Overflow
- c++ - Which is faster: Stack allocation or Heap allocation - Stack Overflow
- How is the memory layout of a C/C++ program? - Stack Overflow
- Memory Layout of C Programs - environment variables - GeeksforGeeks
- 20 issues of porting C++ code to the 64-bit platform -- endianness, bitwise shifting, serialization, data alignment, data model
- c++ - Stack Memory vs Heap Memory - Stack Overflow
- Tagged pointer - Wikipedia
- Segmentation fault - Wikipedia
- address zero VS null pointer - Stack Overflow
- c - Address of NULL pointer - Stack Overflow
- c - NULL as a pointer valid address? (void*)0 - Undefined Behavior - Stack Overflow
- In C, can an address of a pointer be 0? definitive answer - null pointer vs null pointer constant - Stack Overflow
- c++ - Could I ever want to access the address zero? definitive answer - address 0 vs null pointer - how to assign address zero to a pointer without assigning null pointer constant - embedded devices, playstations kernel - Stack Overflow
- c - What is the difference between NULL, '\0' and 0 - defintive answer - Stack Overflow
- Why are NULL pointers defined differently in C and C++? 0, NULL, nullptr - Stack Overflow
- c++ - What exactly is nullptr? - Stack Overflow
- NULL in C++ - The macro NULL is an implementation-defined null pointer constant - cppreference.com
- nullptr, the pointer literal - null pointer constant - cppreference.com
- std::is_null_pointer - checks std::nulltptr_t - cppreference.com
- std::nullptr_t - type of the null pointer literal/constant - cppreference.com
- Is C NULL equal to C++11 nullptr - Stack Overflow
- Understanding nullptr in C++ - GeeksforGeeks
- c++ - What are the advantages of using nullptr over NULL? definitive answer on differences - Stack Overflow
- Migrating from C to C++: NULL vs nullptr — Embedded Artistry
- What's the difference between NULL and nullptr in C++? - Quora
- c - void* will have the same representation and memory alignment as char* - interchangeability - Stack Overflow
- c - Are there any platforms where pointers to different types have different sizes? - Stack Overflow
- memory management - Why / when to use `intptr_t` for type-casting in C? C program portability - Stack Overflow
Strict_Aliasing
- DEFINITIVE - Strict aliasing rule and 'char *' pointers - definition, discussion, optimization, criticism - lifetime, storage
- casting - C++: Is it safe to cast from wchar_t* to unsigned short*? strict aliasing - Stack Overflow
- DEFINITIVE - What is the strict aliasing rule? endiannes/byte order, alignment, structs packing
- C++'s Strict Aliasing Rule - Is the 'char' aliasing exemption a 2-way street? - Stack Overflow
- c++ - Does casting a char array to another type violate strict-aliasing rules? - Stack Overflow
- c - gcc, strict-aliasing, and horror stories - Stack Overflow
- c - When is char* safe for strict pointer aliasing? - Stack Overflow
- What does the C ??!??! operator do? trigraph
- Why it is important to check what the malloc function returned : C_Programming
- Checking the return of malloc() for NULL is not currently considered good practice - secure coding
- chasing a phantom: checking the return of malloc – Jens Gustedt's Blog
- Secure Coding Best Practices for Memory Allocation in C and C++ - malloc, calloc
- How to Allocate Dynamic Memory Safely - stack-based/heap-based memory management - RTOS memory parition - Multitasking memory management - Memory management libraries - memory pools - static memory allocation/preallocation -
- c - What is the Best Practice for malloc? secure coding
- c - When a program terminates what happens to the memory allocated using malloc that is not free'ed? - Stack Overflow
- Do you generally abort execution when/if malloc returns NULL? - In library code - abort - Virtual Memory Overcommit
- If malloc() fails to allocate the required memory, does it return? - Valgrind
- If malloc fails, it's not for the obvious reason - vm.overcommit Virtual Memory
- c - What if malloc fails? abort
- c - Should I check if malloc() was successful? - Stack Overflow
- Why it is important to check what the malloc function returned - Undefined Behavior, null pointer dereference
- This is one of those "let's ignore malloc failing" bugs - Worse is Better
- C how to handle malloc returning NULL? exit() or abort() - Stack Overflow
- c - Why malloc memory in a function and free it outside is a bad idea? - Stack Overflow
- c - Memory allocated with malloc does not persist outside function scope? Pass-by-value paradigm
- Dynamic Memory Allocation and Fragmentation in C and C++ - malloc, free - Memory spaces, static/automatic/dynamic memory - Memory Fragmentation - with RTOS Real Time Operating System - Memory Leak Detection - Real Time Memory Solutions
Dynamic_Memory_Allocation
- definitive - Handling out-of-memory OOM conditions in C - malloc returning null - xmalloc wrapper function, xalloc_die() - recovering/aborting/segfault policies - GLib, g_malloc, g_try_malloc, g_realloc - Best Current Practices with lighttpd, redis - Git version of xmalloc
- How can I dynamically allocate a multidimensional array? malloc, free -
- XMalloc: A Scalable Lock-free Dynamic Memory Allocator for Many-core Machines - SIMD processors/CPUs
- C’s Memory Model - valgrind - malloc, xmalloc, xalloc, calloc, xcalloc - Undefined Behaviorv - read-only memory, .text - address of - stack allocation
- Function pointer conversion to void * generic pointer
- Dynamic array - Wikipedia
- Out of memory - mmap
- c - How does free know how much to free? - definitive visual explanation - information sotred in the allocated data block header - malloc, segmentation fault, undefined behavior
- c - Array or Malloc? - VLAs - allocation failures
- MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type - SEI CERT C Coding Standard - MEM02-C. Immediately cast the result of a memory allocation function call into a pointer to the allocated type - secure coding - malloc cast - definitive discussion in comments
- mmap - Wikipedia
- How do the brk and mmap system calls work in the Linux kernel? - Quora
- c++ - mmap() vs. reading blocks - Stack Overflow
- What is `mmap` in C?
- Memory Mapped Files - i0exception - Medium
Calling_Conventions
- How many arguments are passed in a function call? - Stack Overflow
- Code Generation & Parameter Passing - calling conventions
Main_function
- Is it mandatory to use "return" and "void" in the functions in C? - Stack Overflow
- c++ - Difference between void main and int main? - signature
- Entry point - Wikipedia
- Difference between main(void) and main() in C - Stack Overflow
- What should main() return in C and C++? Non-necessity of explicit return at the end of main - Omission of return statement - $? command in shell - main(void) vs main() -
- c++ - Should I return EXIT_SUCCESS or 0 from main()? - Stack Overflow
- c++ - Must the int main() function return a value in all compilers? C++, C99/C11 vs C89
- Why would you precede the main() function in C with a data type? - Stack Overflow
- Where are C/C++ main function's parameters? Program Startup, main arguments argc, argv - - Stack Overflow
- c++ - Why do we need argc while there is always a null at the end of argv? argv[argc] = NULL - Stack Overflow
- Command line arguments in C, cant understand its behaviour - Undefined Behavior argv, argc - crt0 - Stack Overflow
- What are the valid signatures for C's main() function? int main() vs int main(void) in C vs C++ - Stack Overflow
- Linux x86 Program Start Up - before and after main function - _start(), __libc_start_main(), __libc_csu_init(), __gmon_start__(), diagram of program start up execution from loader to main - environment variables - definitive visual explanation
- What the reasons for/against returning 0 from main in ISO C++? - Stack Overflow
- c++ - What was the rationale for making `return 0` at the end of `main` optional? - Stack Overflow
- void main(void) - the Wrong Thing - main function signature - definitive arguments, assembly code
- Main function in C - hosted vs freestanding environment - cppreference.com
- c - Difference between int main() and int main(void)? declaration vs definition - f() vs f(void)
Format_Strings
- scanf format string - Wikipedia
- printf format string - Format placeholder specification : syntax %[parameter][flags][width][.precision][length]type - platform-independant conversion specifiers macros - vulnerability, attack -Wikipedia
- Platform independent size_t Format specifiers in c? - Length modifiers - Stack Overflow
- What is %p in the printf function in C programming language? - Quora
- c++ - Where is `%p` useful with printf? - Stack Overflow
- c - How do format specifiers work internally? - Stack Overflow
- c++ - Why does printf not print out just one byte when printing hex? undefined behavior - Stack Overflow
- C/C++ function definitions without assembly - Stack Overflow
- C - scanf, fscanf, sscanf, scanf_s, fscanf_s, sscanf_s - cppreference.com
- c - printf("%p") and casting to (void *) - Stack Overflow
- C - printf, fprintf, sprintf, snprintf, printf_s, fprintf_s, sprintf_s, snprintf_s - cppreference.com
- C++ - std::printf, std::fprintf, std::sprintf, std::snprintf - cppreference.com
Variadic_Functions
- Technically, how do variadic functions work? How does printf work? implementation details - Stack Overflow
- Why does a function with no parameters (compared to the actual function definition) compile? - Stack Overflow
- Access to variadic function' arguments without va_list in C - Stack Overflow
- An example of use of varargs in C - Stack Overflow
- What is the format of the x86_64 va_list structure? - Stack Overflow
- c - Correct format specifier to print pointer or address? Need for cast to void pointer in variadic function - - Stack Overflow
- The GNU C Library - Variadic functions - C Language Facilities in the Library
- Variadic function - Wikipedia
- c - %p format specifier needs explicit cast to void* for all types but char* in printf - argument interchangeability - representation, alignment
- c - Argument conversion: (normal) pointer to void pointer, cast needed? printf %p format specifier - definitive answer with quotes from standard - variadic functions conversion rules - default argument promotion - ellipsis notation
- c - When printf an address of a variable with %p, why use void*? no implicit conversion to void* in variadic function, as there is no declaraed parameter - definitive answer - pointer arithmetics - cast pointer to int drawbacks, pointers substraction - pointer size/representation by C standard - (u)uintptr_t - pointer vs number - Cray T90
- Variadic functions in C++ - cppreference.com
- Variadic functions in C - cppreference.com
- Variadic arguments in C - cppreference.com
- c - Why cast is needed in printf? variadic function and type casting requirement vs non-variadic function - definitve answer - Stack Overflow
Types
Understanding_C_Declarations
- DEFINITIVE - Clockwise/Spiral Rule - cdecl - making sense of c expression declaration - signal function meaning, interpretation
- Reading C type declarations
- Spiral rule and 'declaration follows usage' for parsing C and C++ declarations - Stack Overflow
- DEFINITIVE - Understanding typedefs for function pointers in C - signal function, handler -
- object oriented - Can a C struct behave like it had a function? - Object Oriented Simulation in C - member function
- Can I define a function inside a C structure? Object Oriented Simulation in C - member functions
- Interpreting More Complex Declarators | cdecl - C Declarations
- c++ - Typedef function pointer? - Stack Overflow
Object_qualification_const-ness-volatile
- c++ - What is the difference between const int*, const int * const, and int const *? - Stack Overflow
- Const Correctness, C++ FAQ
- c++ - Const before or const after? - Stack Overflow
- Const Correctness, C++ FAQ
- const (computer programming) - Wikipedia, the free encyclopedia
- c++ - Easy rule to read complicated const declarations? - Stack Overflow
- C++: const reference, before vs after type-specifier - Stack Overflow
- volatile type qualifier in C - cppreference.com
- Const correctness in C vs C++ -
- const (computer programming) - C vs C++ - definitive
- c++ - const vs constexpr on variables - Stack Overflow
- c++ - Difference between `constexpr` and `const` - Stack Overflow
- Demystifying constexpr
- constexpr specifier (since C++11) - cppreference.com
- 4.13 — Const, constexpr, and symbolic constants | Learn C++
- Understanding constexpr specifier in C++ - GeeksforGeeks
- newbie question: c++ const to non-const conversion - value vs reference/pointer
Declarations-Definitions-Storage_Duration_Specifier
- Difference between static in C and static in C++?? - Stack Overflow
- Static functions in C - GeeksforGeeks
- What is the difference between static and extern in C? - Stack Overflow
- When to put static function definitions in header files in C? - Stack Overflow
- What is the deep difference between static & extern declaration in C/C++ programming? - Quora
- Static Variables in C - GeeksforGeeks
- Static (keyword) - Wikipedia
- syntax - What does "static" mean in C? vs C++ - Stack Overflow
- function pointers - static vs extern "C"/"C++" - Stack Overflow
- variable declaration - When to use extern in C++ - Stack Overflow
- Understanding "extern" keyword in C - GeeksforGeeks
- How to correctly use the extern keyword in C - definitive explanation - errno implementation example in stdio.h
- What is the lifetime of class static variables in C++? - Stack Overflow
- Finding C++ static initialization order problems - Stack Overflow
- c - static declaration of m follows non-static declaration - vs extern - Stack Overflow
- C/C++ global vs static global - Stack Overflow
- Storage class specifiers in C++ - static, extern, thread_local, mutable - storage duration - no/internal/external linkage - construction/destruction time - cppreference.com
- Storage-class specifiers in C - storage duration : automatic, static, thread, allocated/dynamic - keywords auto, register, static, extern - linkage type : no linkage/internal/external linkage - file-scope/global variable - life time
- Static variable - .bss, . data - Wikipedia
- Thread-local storage - static/global memory local to a thread - errno
- Finding C++ static initialization order problems - Stack Overflow
- c - Static vs global - internal/external linkage - Stack Overflow
- cv (const and volatile) type qualifiers in C++ - cppreference.com
- c - How to print value of global variable and local variable having same name? - Stack Overflow
- scope - How can I access a shadowed global variable in C? extern/static - Stack Overflow
- inline function specifier in C - cppreference.com
- c - Static const variable declaration in a header file - translation unit is the individual source file - Stack Overflow
- Internal Linkage and External Linkage in C - GeeksforGeeks
- c - extern declaration and function definition both in the same file - multiple declarations allowed but only one definition - Stack Overflow
- c - Can local and register variables be declared extern? definitive about scope of extern local/variable variables - Stack Overflow
- c - Usage of extern in the same file - definitive global/local extern variables explanation - access shadowed global variable
- DEFINITIVE - Why are some functions declared extern and header file not included in source in Git source code? definitive in-depth explanation extern/static functions/variables -
- DEFINITIVE - Why are global and static variables initialized to their default values? Security - static/auto storage class - Stack Overflow
- What is the lifetime of a static variable in a C++ function? storage duration - Stack Overflow
- Static variables in C++ - file-scope static variable defined in header
- c - How do I use extern to share variables between source files? definitive explanation on extern keyword - Golden Rules about using global variables with extern/static keywords - SPOT Single Point of Truth - Header Guards, Variable Initialization - Avoiding Code Duplication - declaration vs definition
- Declarations and Initializations - extern, auto, static
- External variable - extern keyword - static - declaration vs definition - lifetime, scope
- static and extern global variables in C and C++ -
- Lifetime in C - of dynamically allocated objects - vs storage duration - temporary lifetime
- Scope in C - file/block/function scopes - linkage, storage duration
- c - Global variables in header file - tentative definition
- c++ - Are global variables extern by default or is it equivalent to declaring variable with extern in global? file-scope vs static vs extern - storage duration, internal/external linkage
- Global variables in C are static or not? - Stack Overflow
- What is the difference between an extern variable and global variable in C? - Quora
- c - About Tentative definition - full definition - pure declaration with extern
- compilation - Tentative definitions in C and linking
- variables - What is the rationale behind tentative definitions in C? - backwards compatibility with pre-C89
- c - External definition for identifier with internal linkage - external definition (outside function scope at file-scope) vs extern variable
- C vs C++ default global variable linkage, multiple declaration & definition problem - tentative - definitive - standard extension
- standards - Why a variable can't be defined twice in 2 files in C - tentative definitions, declaration, intern/extern linkage - definitive quotes from standard
- Tentative definitions - internal/external linkage
- Krister Walfridsson’s blog: Tentative variable definitions, and -fno-common - GCC optimization - x86, ARM
- Linkage - global/local - external/internal - extern, static, auto storage-class specifiers
- Tentative Definitions - internal/external linkage - static/ extern storageclass specifier
- Declarations in C- VLAs
- c++ - "extern" inside a function? - accessing shadowed file-scope external variables
- c++ - Where in a declaration may a storage class specifier be placed? - Stack Overflow
- c - GCC: why constant variables not placed in .rodata - static, bss, data segments
- Automatic variable - storage duration -
- What is a "static" function in C? - Stack Overflow
- What is a static function in C? - Quora
- Lifetime in C++ - storage
- Are file-scope `static` variables in C as bad as `extern` global variables? - definitive - lifetime - vs class static member - thread safety, data encapsulation - test - dependency inversion principle
- c - Why does GCC not assign the static variable when it is initialized to 0 - Stack Overflow
- DEFINITIVE - Why are static variables auto-initialized to zero? .bss- loading process, loader - K&R Kernighan&Ritchie1 (Appendix A, §6.8) - Static and external variables which are not initialized are guaranteed to start off as 0; automatic and register variables which are not initialized are guaranteed to start off as garbage - ELF - C Startup code
- DEFINITIVE - External and tentative definitions, pure declaration with extern - one definition rule - external vs extern keyword - full/actual definition with initializer - definitive - global variable is external variable with external linkage
- Pitfalls in C and C++: Unsigned types | Sound Software .ac.uk
- C data types - Format specifiers - Fixed-width integer types - Wikipedia
- c++ - Why data type is needed in pointer declaration? - Stack Overflow
- c - Why type cast a void pointer? - Stack Overflow
- C - when is casting void pointer needed? - Stack Overflow
- c - why is this casting to void pointer valid? - Stack Overflow
- c - What type for subtracting 2 size_t's? - Stack Overflow
- integer literal - decimal-literal, octal-literal with prefix 0, hex-literal with prefix 0x, binary-literal with prefix 0b/0B - Integer suffixes as u/U for unsigned integer, l/L for long integer and ll/LL for long long - cppreference.com
- Fundamental types in C++ - Data Model LP32/LLP64, ILP32/LP64 - void type - complete/incomplete types - Range of values - cppreference.com
- Fundamental Arithmetic types in C - Data Model LP32/LLP64, ILP32/LP64 -date model width - range of values - wchar_t, char16/32_t - _Bool
- Type system overview in C++ - compatible types - complete/incomplete types - cppreference.com
- Implicit conversions in C++ - integer promotion - cppreference.com
- Fixed width integer types (since C++11) - include <cstdint> header - integer limits - cppreference.com
- Fixed width integer types (since C99) - stdint.h - inttypes.h header - Format macro constants - fprintf/fscanf conversion specifier - (u)intptr_t - platform-independant conversion specifiers macros - integer limits - uint8_t, uint32_t, uint16_t
- std::ptrdiff_t in C++ - defined in cstddef - pointer arithmetics - cppreference.com
- ptrdiff_t in C - defined in stddef.h - pointer arithmetics - PTRDIFF_MAX, SIZE_MAX, INT_MAX - signed counterpart of size_t, equivalent/synonyme to intptr_t
- c - size_t vs. uintptr_t - segmented memory architecture - embedded systems - internal representation, bit pattern
- c - What is intptr_t,is it a type for integer or pointer? uintptr_t - pointe to void - void *
- c - void * arithmetic - void type, GCC extensions - -Wpointer-arith - Stack Overflow
- Pointer arithmetics - void type, GCC extensions, sizeof(void) = 1 - void * -Wpointer-arith
Aggregates_and_POD
- What are Aggregates and PODs and how/why are they special? - Stack Overflow
- What are POD types in C++? - Stack Overflow
- c++ - trivial vs. standard layout vs. POD - Stack Overflow
- compound literals - unnamed object
- Function declaration in C++ - parameter list - void paramater - cppreference.com
- Is there a difference between foo(void) and foo() in C++ or C? - Stack Overflow
- c - func() vs func(void) in c99 - parameter - Stack Overflow
- c++ - What does casting to `void` really do? - Stack Overflow
- c - Why cast an unused function parameter value to void? - Stack Overflow
- Typecasting - C
- Type support - Additional basic types and convenience macros in stddef.h - size_t, ptrdiff_t, NULL, max_align_t, offsetof, alignas, alignof - - cppreference.com
- Numeric limits in C - limits.h/stdint.h/float.h - CHAR_BIT - SIZE_MAX - PTRDIFF_MIN/MAX - INT_MAX/MIN
- size_t - ssize_t defined in sys/types.h - unsigned integer type of the result of sizeof , alignof (since C11) and offsetof, depending on the data model
- c - How can I convert to size_t from int safely? - Stack Overflow
- Wide character - wchar_t vs char32_t - Wikipedia
- Function declarations in C - f() vs f(void) difference until C2x (obsolete) - Undefined Behavior - without prototype - vs definition - typedef function - default arguments/integer promotion
- Implicit conversions in C - arithmetic conversion rules - default integer promotion function without prototype and variadic function's trailing argument matched against ellipsis - signedness conversion - three exception arrau to pointer decay - pointer conversion to and from void* - definitive null pointer constant zero 0 VS NULL macro equivalence - Signed integer conversion implementation defined - array to pointer decay with three exceptions, address of array - no implicit conversion between integer and pointer - integer overflow - integer type rank - Function to pointer conversion -
- Not casting pointers in C can cause problems? implicit conversion - definitive answer on internal pointe representation - pointer to char (char*) interchangeability with pointer to void (void*) - Language does not support implicit conversions between incompatible pointer types
- Why does C need "struct" keyword and not C++? - Stack Overflow
- INT36-C. Converting a pointer to integer or integer to pointer - SEI CERT C Secure Coding Standard - uintptr_t
- c - What is the motivation for casting a pointer into a integer? uintptr_t, intptr_t, usecase - pointer hash code computation - user-space to kernel-space transmission via syscalls arguments - GCC extensions __attribute__, builtin
- rsize_t type - synonym to size_t - secure coding
- DEFINITIVE - About size_t and ptrdiff_t - size_t and uintptr_t are synonyms - ptrdiff_t and intptr_t are synonyms - safety, secure coding, performance
- size_t - vs uinptr_t - definitive
- c++ - Why is rsize_t defined? C11, Annex K - deprecated - definitive rationale explanation - secure coding - secure std functions - RSIZE_MAX - vs size_t - two's complement
- c - Is a conversion to `void *` required before converting a pointer to `uintptr_t` and vice versa? internal representation pointers, bit pattern
- c++ - unsigned int vs. size_t - Stack Overflow
- c++ - Should I use std::size_t or int in my for loops? - Stack Overflow
- int - What is size_t in C? - Stack Overflow
- c++ - Difference between size_t and std::size_t - Stack Overflow
- c++ - Why is size_t unsigned? - Stack Overflow
- c++ - should use size_t or ssize_t - ssize_t is not included in C standard but in POSIX interface - ptrdiff_t - SSIZE_MAX
- c++ - Cast ssize_t or size_t - Stack Overflow
- c++ - why is sizeof(ptrdiff_t) == sizeof(uintptr_t) - SIZE_MAX - PTRDIFF_MAX
- What is the maximum size of an array in C? SIZE_MAX, size_t - PTRDIFF_MAX - 32-bit vs 64-bit
- size t - Does "std::size_t" make sense in C++? - Stack Overflow
- c++ - What's the real size of `size_t`, `uintptr_t`, `intptr_t` and `ptrdiff_t` type on 16-bit systems using segmented addressing mode? - Stack Overflow
- Signed and Unsigned Types in Interfaces - scott meyers
- What is the unsigned counterpart of ptrdiff_t? unsigned counterpart of ptrdiff_t - contradicts en.cppreference.com/w/c/types/ptrdiff_t - ssize_t signed counterpart of size_t
- How to correctly cast a pointer to int in a 64-bit application? SILP64, LP64, LLP64 data models - 32 vs 64-bit - intptr_t, size_t, INT_PTR
- LP64 (I32LP64) Data Model
- LLP64 (ILP32LLP64, P64)
- Memsize-type - pointers, size_t, ptrdiff_t, intptr_t, SIZE_T, DWORD_PTR
- ptrdiff_t - synonym to intptr_t
- cast operator in C - explicit conversion - (void)
- C10k problem - ten thousands connections - Network/Socket Programming - NginX
- Bit fields in C - padding
- Difference between _Bool and bool types in C? - Stack Overflow
- DEFINITIVE - What is the difference between scalar types and aggregate types in C? Arithmetic types and pointer types are collectively called scalar types. Array and structure types are collectively called aggregate types -
- terminology - What does it mean when data is scalar? type
- Type system overview in C - compatible types - complete/incomplete - C vs C++ difference - types groups, objects, characters, integers, real, arithmetic, scalar, aggregate, derived declarator
- POSIX <sys/types.h> - ssize_t definition - SSIZE_MAX
- 13575 – SSIZE_MAX defined as LONG_MAX is inconsistent with ssize_t, when __WORDSIZE != 64
- POSIX <limits.h>
- General Limits (The GNU C Library) - ssize_t SSIZE_MAX
- c - Will write(2) always write less than or equal to SSIZE_MAX? - _POSIX_SSIZE_MAX - EINVAL
- Function definitions in C - default argument/integer promotion - __func__, __line__ predefined macros constants
- Is it better to use C void arguments "void foo(void)" or not "void foo()"? f() vs f(void)
- parameters - main function in C with void and without void - f() vs f(void)
- Function prototype/interface - Wikipedia
- c++ - Is the return type part of the function signature? specialization of function templates
- history - Why did C have the return type before functions? signatures
- c++ - why is sizeof(ptrdiff_t) == sizeof(uintptr_t) - Stack Overflow
Operators_Properties
Bitwise_operations
- bit manipulation - XOR operator in C - Stack Overflow
- c - What is Bit Masking? - Stack Overflow
- What is a bitmask and a mask? - Stack Overflow
- Index of file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Software_development/Programming/Paradigms_and_methods/Generalities/Progamming_generalities/bitwise_operations/
- Bitwise operations in C - Wikipedia, the free encyclopedia
- difference bitwise and and logical and c at DuckDuckGo
- What are the differences between bitwise and logical AND operators in C/C++? - GeeksforGeeks
- bitwise operators - Difference between & and && in C? - Stack ...
- proof - How to prove that the C statement -x, ~x+1, and ~(x-1) yield the same results? - Stack Overflow
- c++ - Is there any advantage to c-style bit manipulation over std::bitset? - SWAR (SIMD within a register) - bitwise
- C++ bitset implementation - Code Review Stack Exchange
- GitHub - drali/BitSet: A faster bitset implementation than gcc's std::bitset
- Understanding this bitset implementation (C++) - Stack Overflow
- std::bitset - cppreference.com
- std::bitset<N>::bitset - cppreference.com
- C++ bitset and its application - GeeksforGeeks
- C++ Bitset With Example | Owlcation
- Compressed bitset libraries in C and C++ – Daniel Lemire's blog
- std::vector<bool> - possibly space-efficient specialization of std::vector for the type bool - dynamic equivalent to bitset
- C Operator Precedence - cppreference.com
- Arithmetic operators - C language - conversion/typecasting one operand - handling of mixed sign operands - integer overflows - bitwise shift operations - Integer promotion - definitive explanation on pointer arithmetics - ptrdiff_t - usinged integer overflows - modulo arithmetic - floating point
- Arithmetic operators - Cpp language - conversion/typecasting one operand - hadnling of mixed sign operands - integer overflows - bitwise shift operations - Integer promotion - pointer arithmetics, ptrdiff_t - definitive explanation on pointer arithmetics - cppreference.com
- Subscript Operator [] | Microsoft Docs
- ?: - Ternary Operator - conditional operator, inline if (iif), or ternary if - C vs C++ - Elvis Operator
- Operators in C and C++ - precedence - arithmetic, comparison, logical, bitwise -
- Comma operator - Wikipedia
- Is there a performance difference between i++ and ++i in C vs C++? definitive - postfix/prefix increment operator
- Is there a performance difference between i++ and ++i in C++? postfix/prefix increment operator implementation
- c++ - Why does the postfix increment operator take a dummy parameter? prefix - signature
- c++ - STL iterators: Prefix increment faster? - Stack Overflow
- gcc - What is "!!" in C? - Stack Overflow
- stupefy developer: c: double exclamation - used in linux kernel code
- Assignment operators - cppreference.com
- Associative property - left/right associativity - right-to-left/left-to-right - non associative operators
- Operator associativity - non associative, right/left associative operators - Right-associativity of assignment operators
- Initialization in C - storage duration, static/thread local, automatic
- Other operators in C - function call - without prototype - default arguments/integer promotion - undefined behavior - function to pointer implicit conversion/chained dereferencing, function designator - printf, trailing ellipsis - conditional, comma operator - interchangeability between pointer to void (void *) and pointer to char (char *)
Order_of_Evaluations-Sequencing
- Order of evaluation in C - sequencing, sequence points - undefined behavior - increment operator - side effects
- c++ - Undefined behavior and sequence points - Stack Overflow
- C++ Core Guidelines: Rules for Expressions - precedence
- How does the post increment operator work in GNU C? valgrind, fsanitize - i=i++ undefined behavior - Software Engineering Stack Exchange
- Sequence point - sequencing, order of evaluation - definitive - i=i++ increment operator - Undefined Behavior - side effects - race conditions, multithreading
- c - Why are these constructs using pre and post-increment undefined behavior? i=i++ Undefined and Unspecified Behavior - Stack Overflow
- Concurrent computing - Wikipedia
- Order of operations - precedence - Programming languages - operators
Strings_Properties
- Null character - NUL - null byte - null terminated string/string terminator - null byte injection - security exploits - represented in escape sequences with prefixes with \ \x or \u - \z
- c - Using printf with a non-null terminated string - Stack Overflow
- c - How do I print a non-null-terminated string using printf? - Stack Overflow
- c++ - Defining a string with no null terminating char(\0) at the end - Stack Overflow
- Character literal - Wikipedia
- Why are strings in C++ usually terminated with '\0'? null byte, null character, NUL, string terminator - strncpy, strlcpy, strcpy_s - Stack Overflow
- Null-terminated string - NUL, null byte, string terminator- strlcpy, gets, strdup - Wikipedia
- Escape character - Wikipedia
- programming languages - What does backslash "\" escape character really escape? - Software Engineering Stack Exchange
- std::strcmp in C++ - cppreference.com
- strcmp in C - cppreference.com
- strncmp in C - cppreference.com
- Null-terminated byte strings - terminating null character, NUL, null byte, string terminator - cppreference.com
- string literals in C - null character/byte appended at translation phase 7 - phase 6 concatenation - read only memory .rodata
- String literal - escape sequences - concatenation - stringification macros
- Escape sequences in C - \x, \n prefixes - hex escape sequence
- Escape sequences in C++ - \x prefix - cppreference.com
- Escape sequences in C - \x prefix - cppreference.com
- Null-terminated wide strings - cppreference.com
- c++ - wchar ends with single null byte or two of them? null terminated wide string - null wide character terminator
- String literals initialization in array vs pointer - read-only memory
- string literal in c++ - null character/byte appended - cppreference.com
- C string handling - Character encodings, Unicode, UTF-8/16/32 - wchar_t - non-ASCII characters prefixed with \x for each byte of UTF-8 and with \u prefix for each word of UTF-16 - wchar_t, wint_t, NULL - string manipulation functions strcpy, strncpy, strlcpy, security/secure strcpy_s, strcat - memory manipulation memset, memcpy, memmove, memcmp, memchr
- Rules for C++ string literals escape character - Stack Overflow
- std::isalpha in C++ - setlocale - ISO-8859-1 extended ASCII
- DEFINITIVE - memory - Why are C string literals read-only? - code .text segment, undefined behavior UB - MMU, mmap - functionnal programming
Signals_And_Callbacks
- timers vs thread kernel at DuckDuckGo
- C signal handling - Wikipedia
- c++ - Why are signals and slots better than plain old callbacks? - Stack Overflow
- c - difference between signal, software interrupt, and hardware interrupt? - Stack Overflow
- a_deeper_look_at_signals_and_slots.pdf
Preprocessor_Instructions
- http://www.agner.org/optimize/calling_conventions.pdf
Conversion_Functions
- c - atoi vs atol vs strtol vs strtoul vs sscanf - definitive comparison - Stack Overflow
- atoi vs strtol? gets, deprecated functions : cpp_questions
- strtol, strtoll - cppreference.com
- atoi, atol, atoll - cppreference.com
- Passing NULL to atoi() Function results in Segmentation Fault - C / C++
- Language linkage - extern "C" - cppreference.com
- C/C++ Rarer keywords - register, volatile, extern, explicit - Stack Overflow
- c - What is the difference between a definition and a declaration? definitive - a declaration is a definition except for some cases - One Definition Rule
Process_Handling
- c - What is the difference between using _exit() & exit() in a conventional Linux fork-exec? - Stack Overflow
- std::_Exit in C++
- std::abort in C++
- _Exit in C
- abort in C
- exit in C
- c++ - What is the difference between exit() and abort()? - Stack Overflow
- c++ - abort, terminate or exit? - Stack Overflow
- c - how to exit a child process - _exit() vs. exit - Stack Overflow
- c - How does the fork() know whether it is in child process and in parent process? - Stack Overflow
- Fork–exec - child process
- Spawn (computing) - vs fork-exec - CreateProcess API
- c - fork() returns 0, but the child process getpid()!=0. Why? getpid, getppid - definitive
- linux - Why fork() return 0 in the child process? - Stack Overflow
- programming - Where does fork() actually start? - definitive
- c - How does fork system call really works - process scheduling, run queue -
- The fork() System Call - how it works internally
- quick_exit - cppreference.com
- atexit - cppreference.com
- kill - Default exit code when process is terminated? exit value meaning - 128+n if command process terminated by signal n
- vfork() - Unix, Linux System Call - Tutorialspoint
- vfork() — Create a new process - #include <sys/types.h> #include <unistd.h> headers
- linux - Why is vfork() intended to be used when the child process calls exec() or exit() immediately after creation? - Unix & Linux Stack Exchange - exit(), _exit(), posix_spawn(), execve()
- Learn and use fork(), vfork(), wait() and exec() system calls across Linux Systems - visual explanation
- c - What is the difference between fork() and vfork()? - copy on write - risks, dangers
- c - How does fork() work? - definitive visual explanation - Copy On Write COW, open(), dup2()
- C process control - abort(), exit(), _Exit(), atexit(), quick_exit(), at_quick_exit(), getenv(), system() - definitive list of C lib functions
- Isn't #defining TRUE to be 1 dangerous, since any nonzero value is considered ``true'' in C? What if a built-in logical or relational operator ``returns'' something other than 1?
- Order of evaluation in C++ - sequence points, sequencing - undefined behavior
References
- Tenouk index for on C++, C, STL, Win32, MFC, Winsock, Linux Socket, Buffer Overflow tutorials
- C and C++ complete reference, based on languages standards
- How to Make If Statements More Understandable - Fluent C++
- C/C++ for Hackers « Null Byte :: WonderHowTo
- Formal verification of C/C++ code for critical systems
- Compatibility of C and C++ - Wikipedia
Rust
- Rust is self driving C++ – Robert Grosse – Medium
- Barely Functional
- Writing a CHIP-8 emulator with Rust and WebAssembly
- Oxidizing Source Maps with Rust and WebAssembly – Mozilla Hacks – the Web developer blog
- GitHub - hackndev/zinc: The bare metal stack for rust
dotNET
- What is the difference between the Common Language Runtime (CRT) and Windows Runtime (WinRT)?
- CLR Journey from PInvoke to WinRT - CodeProject
- What is the difference between WinRT, UWP (Universal Windows Platform) and WPF? - Software Development - Stopbyte
- CLR, Win32, WinRT in Windows architecture - Stack Overflow
C-sharp
Delegates-Events
- Delegate (CLI) - Wikipedia
- .net - Are delegates and callbacks the same or similar? - Stack Overflow
- Combining the Advantages of Qt Signal/Slots and C# Delegates/Events | blogs.kde.org
- C# BAD PRACTICES: Learn how to make a good code by bad example – Part 4 - CodeProject
- Uploading Files to AWS - DZone Cloud
- Serialization (C#) | Microsoft Docs
- Adding a New Bytecode Instruction to the CLR - CodeProject
- How to Hash Passwords in PHP in a Modern way - Coding Security
- iOS UI Tools vs. Microsoft UI Tools
- The CLR Thread Pool 'Thread Injection' Algorithm - CodeProject
- Plateforme .Net : le ramasse-miettes
Java
Signal_Handling
- Handle Signals and Exceptions
- java - What is object serialization? - Stack Overflow
- java - When would I want to make my private class static? - inner class
- Can a static nested class be instantiated in Java? - inner class - vs C++
Python
- boost python (C++ Boost) at DuckDuckGo
- IntegratedDevelopmentEnvironments - Python Wiki
- The Python Tutorial — Python 3.6.3 documentation
- Python2orPython3 - Python Wiki
- 3 mistakes to avoid when learning to code in Python | Opensource.com
- Teaching Python and more with open educational resources | Opensource.com
- How do you distribute python apps - Coding Security
- 7 Best Python Books To Learn Programming » TechWorm
- Simplifying Offline Python Deployments With Docker – Real Python
- opensource.com/article/18/1/parsing-html-python?sc_cid=7016000000127ECAAY
- Python Tutorial
- An introduction to Python bytecode | Opensource.com
- I Made a News Scraper with 100 Lines of Python. – Hacker Noon
- 3 practical Python tools: magic methods, iterators and generators, and method magic | Opensource.com
- Python Debugging With Pdb – Real Python
- python - What is the difference between venv, pyvenv, pyenv, virtualenv, virtualenvwrapper, pipenv, etc? - Stack Overflow
- python - What is the purpose of self? - Stack Overflow
- correct way to define class variables in Python - Stack Overflow
- pep8 Pyhton Style Guide at DuckDuckGo
Swift
- Start Developing iOS Apps (Swift): Build a Basic UI
- The Swift Programming Language (Swift 4): Access Control
- Swift.org - API Design Guidelines
- Value and Reference Types - Swift Blog - Apple Developer
- GitHub - raywenderlich/swift-style-guide: The official Swift style guide for raywenderlich.com.
- A Better Way to Organize Swift Classes - License to Kill -9
- What’s New in Swift 4?
- What is an optional value in Swift? - Stack Overflow
- The Implicitly Unwrapped Optional & When To Use It — KrakenDev
- Mobile_Development - YouTube - YouTube
- Timer - Foundation | Apple Developer Documentation
- How to make an action repeat using Timer - free Swift 4 example code
- Fastest, leanest way to append characters to form a string in Swift - Stack Overflow
- Static function variables in Swift - Stack Overflow
- How to tell Xcode where my info.plist and .pch files are - Stack Overflow
- swift3 - Getter inside setter in Swift 3 - Stack Overflow
- The Swift Programming Language (Swift 4): Type Casting
- as keyword swift - Google Search
- swift - What's the difference between "as?", "as!", and "as"? - Stack Overflow
- Difference between 'is' and 'as' keyword in swift - Stack Overflow
- Swift 3.0 - as, as?, as! and is operators. Downcasting and upcasting
- c++ 11 instanceof - Google Search
- Swift Programming: Info and Tutorials
- Kotlin vs. Swift: Are Android and iOS moving towards creating a universal language?
- Why we’re writing our website in Swift – Hackers at Cambridge – Medium
- GitHub - fastred/Optimizing-Swift-Build-Times: Collection of advice on optimizing compile times of Swift projects.
- Secure Coding in Swift 4
- Deploying Swift to Ubuntu – Dimitry Z – Medium
- Swift-ObjC API Exchange and NSTouchBar – Podcast S07 E04
- Apple's Swift language finds its way into Google's secret Fuchsia OS
- Why Google forked Apple's programming language Swift, according to Google
- A C# developer learns Swift Part 1: Core Data - SEP Blog
- Swift for the Java Guy Part 1: Getting Started - DZone Java
Ruby
- Answer - Quora
Ruby_programming_language
- bundler vs RVM vs gems vs RubyGems vs gemsets vs system ruby - Stack Overflow
- Index of Classes & Methods in drb: Ruby Standard Library Documentation (Ruby 2.4.2)
Ruby_on_Rails
- Ruby on Rails Guides
- 13 Reasons You Should Learn Ruby on Rails
- Create a Linux desktop application with Ruby | Opensource.com
OCaml
- Ocaml / functional programming · GitHub
PHP
Go
- Using Go for Scalable Operating System Analytics – Kolide
- 7 stages of becoming a Go programmer | Opensource.com
D
- 5 reasons the D programming language is a great choice for development | Opensource.com
JavaScript
- JavaScript Code Refactoring - CodeProject
- A perfect guide for cracking a JavaScript interview (A developer’s perspective)
- OK, Now I'll learn How To Program In JavaScript! – Fagner Brack – Medium
- node.js - Differences between socket.io and websockets - Stack Overflow
WebAssembly
- WebAssembly support now shipping in all major browsers - The Mozilla Blog
- Leaning Technologies Blog: Cheerp (C++ to WebAssembly) 2.0RC1 released: as fast as Emscripten, 30-90% smaller output, mixed WebAssembly-JavaScript mode
- All Major Browsers Now Support WebAssembly
- Cheerp Tutorial: Mixed mode C++ to WebAssembly and JavaScript · leaningtech/cheerp-meta Wiki · GitHub
- Introduction to WebAssembly: why should we care? - Federico Tomassetti - Software Architect
- Making WebAssembly even faster: Firefox’s new streaming and tiering compiler – Mozilla Hacks – the Web developer blog
- Creating WebAssembly-powered library for modern web
- Analyzing WebAssembly binaries | Forcepoint
CSS
- How To Animate Using CSS – codeburst
- A complete cheatsheet for CSS(cascading style sheet) - Coding Security
- Why SASS is better than LESS PreProcessor - Coding Security
- CSS Naming Conventions that Will Save You Hours of Debugging
PHP
Languages_Comparison
- Why Are Some Programming Languages Faster Than Others?
- The Observation Deck » The relative performance of C and Rust
- Comparison_between_some_languages.dvi
- Ten interesting features from various modern languages
- How slow is python when compared to c programming - Coding Security
- Comparison of programming languages - Wikipedia
- An Infographic to let your learn programming from scratch
- An interesting programming feature that almost no language has
- Rosetta Code - Equivalent tasks implementations with different languages
- Open Standards for Programming Languages Implementations
Software_Architecture
Code_Design
Design_Patterns
Singletons
- Singletons: Solving problems you didn’t know you never had since 1995 | Onelib
- So Singletons are bad, then what? - Software Engineering Stack Exchange
- Thread-Safe Initialization of a Singleton - ModernesCpp.com
- Singleton
- Singleton I love you, but you're bringing me down (re-uploaded)
- Singletons are Pathological Liars
- singleton-considered-stupid - steveyegge2
- Patterns I Hate #1: Singleton
- c++ - Memory leaks when using a singleton - Stack Overflow
- c++ - Singleton instance declared as static variable of GetInstance method, is it thread-safe? - Stack Overflow
- c++ - Singleton: is there a memory leak? - Stack Overflow
- work stealing pattern at DuckDuckGo
- Observer pattern - Wikipedia
Event-driven_programming
- Event-driven programming - Wikipedia
- Signal programming - Wikipedia
- Dataflow - Wikipedia
- Dataflow programming - Wikipedia
Coding_Standards
- Thoughts from reading: The Clean Code • tracing bytes
- clean code robert c. martin at DuckDuckGo
SOLID_Principles
- Difference between Dependency Injection (one of multiple implementations of Inversion of Control principle) and Dependency Inversion Principle - definitive breakdown with code examples - Stack Overflow
- c# - Solid Principle examples anywhere? Dependency Inversion Principle - Stack Overflow
- Your Code Can Smell! How to Fix It
- The Atoms of Programming
- Are Programmers Headed Toward Another Bursting Bubble?
- Managing software complexity through intent-based programming | TechCrunch
- Software is Increasingly Complex. That Can Be Dangerous. - ExtremeTech
- Simplistic programming is underrated – Daniel Lemire's blog
- Choose one: High productivity or code you can maintain | InfoWorld
- Modularization Isn’t Just About Code - CodeProject
- The principle of least astonishment (POLA), also called the principle of least surprise - Wikipedia
- PostSharp Blog | Aspect-Oriented Programming vs Dependency Injection
- Why choose DI interception over aspect oriented programming? decorator pattern similarity
- AOP vs decorator | Cross Cutting Concerns
- c# - Logging as a decorator vs. Dependency Injection - what if I need to log inside the class? - Stack Overflow
- Aspect (computer programming) - logging - Wikipedia
- Cross-cutting concern - logging - Wikipedia
- Aspect-oriented programming - logging- Wikipedia
- Core concern - logging - Wikipedia
- Separation of concerns - SoC - Aspect/Subject orirented programming, Wikipedia
- Aspect-oriented software development - cross-cutting concerns - Wikipedia
- What are some dead giveaways that someone is a 10X software engineer/developer just by looking at their code? - Quora
- 5 traits of good systems architecture | Opensource.com
- Multicall binaries · Flameeyes's Weblog
Tools
Editors_and_IDEs
Vim
- Vim (text editor) - Wikipedia
- vim - Traversing text in Insert mode - Stack Overflow
- How to get ctags working inside vim - Stack Overflow
- Simple VIM commands you wish you'd known earlier - Stack Overflow
- An Intro to Vim, the Unix Text Editor Every Hacker Should Be Familiar With « Null Byte :: WonderHowTo
- GitHub - archSeer/colibri.vim: A subtle, elegant color scheme for vim.
- How to Turn on Line Numbers in vim – How-To Geek Pro
- How to reload .vimrc file without restarting vim on Linux/Unix - nixCraft
- statusline - How can I see the full path of the current file? file name
- vim vs gvim at DuckDuckGo
- key bindings - What options are there to enter insert mode? - Vi and Vim Stack Exchange
- unix - sometimes my file just freezes in my vi |vim, what happened? - Stack Overflow
- Vim Search/Replace, meaning of %s - definitive syntax
- vi - Find and replace strings in vim on multiple lines - Stack Overflow
- text editor - Navigating in Vim's Command Mode - Stack Overflow
- Search and replace | Vim Tips Wiki | FANDOM powered by Wikia
- How do you reload your .vimrc file without restarting vim? - Super User
- What's a quick way to comment/uncomment lines in Vim? - Stack Overflow
- editor - Vim unresponsive after a C-x C-s sequence - tty
- command line - Open an existing file from Vim - Ask Ubuntu
- mac - How does one switch between windows on VIM? - Super User
- How to open files in vertically/horizontal split windows in Vim from the command line - Super User
- Features of Emacs that are complementary to Vim? - Super User
- There and Back Again - A Hacker’s Switch from Emacs Back to Vi - The Joy Of Hack
- vi - What is your most productive shortcut with Vim? - Stack Overflow
- Vim
- Tutorial | Vim Tips Wiki | FANDOM powered by Wikia
- Vim Cheat Sheet - English
- DEFINITIVE - Vim tips: The basics of search and replace - g global, c confirm flags , % meaning -
Emacs
Configuring_Emacs
Setting_Up_C-Cpp_IDE_In_Emacs
- C/C++ Development Environment for Emacs
- EmacsWiki: Cc Mode
Setting_Up_Python_IDE_In_Emacs
- EmacsWiki: Python Programming In Emacs
- Jedi.el - Python auto-completion for Emacs — Emacs Jedi 0.2.0alpha2 documentation
- Emacs – The Best Python Editor? – Real Python
- Emacs Tutorial | Setup python Environment - YouTube
- How do I display line numbers in Emacs (not in the mode line)? - Super User
- GUI vs. terminal version of emacs - recommendations? : emacs
- plugins - Display line numbers on left margin in Emacs - Super User
- display - How can I get a ruler at column 80? - Emacs Stack Exchange
- package - Do I still need GNU ELPA if I have MELPA? - Emacs Stack Exchange
- Are emacs package repositories a security risk? : emacs
- emacs package management security at DuckDuckGo
- Understanding GNU Emacs and Tabs
- EmacsWiki: No Tabs
- EmacsWiki: Tabs Are Evil
- Great Emacs Lisp Snippets
Using_Emacs
- Emacs avancé
- Emacs Mini Manual (PART 1) - THE BASICS
- EmacsWiki: Site Map
- EmacsWiki: Backspace Key
- How to create LaTeX documents with Emacs | Opensource.com
- GNU Emacs cheat sheet - definitive - refcard.pdf
- emacs cheat sheet
- syl20bnr/spacemacs: A community-driven Emacs distribution - The best editor is neither Emacs nor Vim, it's Emacs *and* Vim!
- Dired Shell Commands: The find & xargs replacement - Mastering Emacs
Visual_Studio
vscode
- Running Visual Studio Code on Linux - compare with WyPlay's Visual Studio Code Genbox Installation regarding pgp/gpg key installation - equivalence /usr/share/keyrings/ and apt-key add command - equivalence between add-apt-repository and manually adding repo into /etc/apt/sources.list.d
- C++ programming with Visual Studio Code
- Debug C++ in Visual Studio Code
- Edit and navigate C++ code in Visual Studio Code
- Customize default settings in Visual Studio Code C++ projects
- C/C++ extension FAQ
- Tasks in Visual Studio Code - tasks.json
- VS Code settings you should customize - DEV Community 👩💻👨💻
- How to edit settings.json in Visual Studio Code?
- Settings - vscode - visual studio code - settings.json
- 12.04 - Why ubuntu has vi , emacs ,nano with os default? - Ask Ubuntu
- Differences between Emacs and Vim - Stack Overflow
- CLion: A Cross-Platform IDE for C and C++ by JetBrains
- ReSharper C++ : The Visual Studio Extension for C++ Development
- AppCode: Smart Swift/Obj-C IDE for iOS & macOS Development
- Why I switched to VIM from Visual Studio Code
- My editor journey: sublime, vim, emacs, vscode - DEV Community 👩💻👨💻
- REAL programmers don’t use Visual Studio - By
- Any long time emacs users tried VSCode? : emacs
- Goodbye VSCode, Hello Emacs Again | Hacker News
Compilers
Compilation_vs_Interpretation
- Interpreter, Compiler, JIT - Nick Desaulniers
- Cross Compiling C/C++ for Android - Nick Desaulniers
Build_Systems
CMake
- A CMake tutorial for Visual C++ developers - CodeProject
- c++ - Difference between using Makefile and cmake to compile the code - Stack Overflow
- c++ - Debug vs Release in CMake - -DCMAKE_BUILD_TYPE=Release/Debug
- CMake - Wikipedia
- More Modern CMake - Deniz Bahadir - Meeting C++ 2018 : Standard C++
- An Introduction to Modern CMake · Modern CMake
- GitHub - mortennobel/CMake-Cheatsheet: Short introduction to CMake with some examples.
- CMake Cheat Sheet | OverAPI.com
- CMake stuff i wish i knew earlier
- mbedded.ninja | CMake Cheat Sheet
- CMake cheatsheet | LeechCraft
- Cmake cheat sheet - Make release build
- CMake: dependencies between targets and files and custom commands | Sam Thursfield's Blog
- CMake-tutorial-pdf*
- Effective Modern CMake · GitHub
- Hello CMake! - Simplify C++!
- c++ - What are the differences and similarities between CMake and qmake? - Stack Overflow
- Why is CMake so popular, and what do you have to do to make it actually work? vs Autotools
- CMake Howto
- C++ Tutorial: make & CMake - 2018
- CMake Definitive Tutorial - cross-platform CMake-based build system - Unix - Building a Library with CMake, shared vs static .so, .lib, .a, .dylib, .dll on Windows, Mac OS X and Linux, performance impact - Compiler/Linker Flags with CMake - Generator/Conditional Expressions - Debug and Release Configuration
- CMake by Example – definitive introductory tutorial - -DCMAKE_INSTALL_PREFIX - Change Build System Generator from makefile to xcode
- Make and CMake : Automating C++ Build Process - Coding Blocks - Medium
- Introduction to CMake by Example | derekmolloy.ie
- How to Build a CMake-Based Project
- Running CMake | CMake
- How to retrieve a user environment variable in CMake (Windows) - Stack Overflow
- How exactly does CMake work? - Stack Overflow
- Definitive FAQ · Wiki · CMake | out-of-source VS in-source builds
- ccmake or cmake? ccmake is curses (terminal handling library) interface to CMake - cmake is the CLI
- It’s Time To Do CMake Right | Pablo Arias
- build - What are the dusty corners a newcomer to CMake will want to know? Finding and configuring 3rd-party libraries - caching variables
- The Ultimate Guide to Modern CMake
- What is the modern method for setting general compile flags in CMake? - Stack Overflow
- Introduction to the Basics · Modern CMake - definitive guide - PUBLIC/PRIVATE/INTERFACE -
- qmake vs cmakelist - Google Search
- Qbs Manual
- Simplifying build in C++ (part 1) · Mathieu Ropert
Makefile
- c - How does make know which files to update - stat(2) linux command - NTP, system clocks
- Makefile - Wikipedia
- Make (software) - Wikipedia
- How to get a shell environment variable in a makefile? - Stack Overflow
- c++ - Add .so and .a libraries to Makefile - Stack Overflow
- c++ - Skipping Incompatible Libraries at compile - Stack Overflow
Autotools
- Flag Variables Ordering (automake)
- Introduction to GNU Autotools - definitive - automake, autoconf
- GNU Libtool - typically used with Autoconf and Automake - shared, static, dynamic libraries - autotools
- gcc - Howto add a link to a library in autoconf configure script / makefile - Makefile.am - automake
- c - How to add CFLAGS in makefile.am - automake, autoconf
- HardeningWalkthrough - dpkg-buildflags
- Autotools Tips (configure.ac, Makefile.am, autoconf, automake, etc) - ClearChain
- Autoconf - definitive - autotools, autoscan, aclocal, autoheader, automake
- DEFINITIVE - The Basics of Autotools – Gentoo Development Guide
- c - Where to add a CFLAG, such as -std=gnu99, into an autotools project - Stack Overflow
- c - what is the difference between AM_LDFLAGS and LDFLAGS - Stack Overflow
- CFLAGS - CXXFLAGS vs CPPFLAGS C PreProcessor
- Exploring Clang Tooling Part 2: Examining the Clang AST with clang-query—Stephen Kelly : Standard C++
- Exploring Clang Tooling Part 1: Extending Clang-Tidy—Stephen Kelly : Standard C++
GCC
- gdb - What is the difference between gcc -ggdb and gcc -g - Stack Overflow
- Tips on the GCC compiler
- Using the GNU Compiler Collection (GCC): C Dialect Options
- How to compile a 32-bit binary on a 64-bit linux machine with gcc/cmake - Stack Overflow
- Using the GNU Compiler Collection (GCC): Debugging Options
- Using the GNU Compiler Collection (GCC): Warning Options
- Using the GNU Compiler Collection (GCC): Top
- c++ - How do you disable the unused variable warnings coming out of gcc in 3rd party code I do not wish to edit? -Wno-unused-variable, -isystem vs -I - Stack Overflow
- c++ - What is "strip" (GCC application) used for? stripped - Stack Overflow
- GNU Compiler Collection (GCC) Internals: Top
- gcc -l -L option flags for library link
- c++ - What are the GCC default include directories? - Stack Overflow
- c - Do I need -pedantic flag from GCC with C11? - Stack Overflow
- c - Do I need -pedantic flag from GCC with C11? - Stack Overflow
- Compiler - Wikipedia
- c - Why was mixing declarations and code forbidden up until C99? - Stack Overflow
- c - C89, Mixing Variable Declarations and Code - Stack Overflow
- Translation unit = Compilation unit vs object file vs executable vs.... in C++ - Stack Overflow
- c++ - What's the difference between the terms "source file" and "translation unit"? - Stack Overflow
Preprocessing
Macros
- C Pre-Processor Magic - macros - definitive
- DEFINITVE - Advanced preprocessor tips and tricks - macros - side effects, sequence point undefined behavior - stringizing # operator, ## concatenation operator - #ifdef vs #if
- Tips And Tricks For The C Pre-processor | macros
- c++ - What are some tricks I can use with macros? preprocessor - X-Macros - errno simplification - logging
- The C Preprocessor: Top - macros
- Preprocessor: __VA_ARGS__ : count arguments
- c - What does __VA_ARGS__ in a macro mean? - Stack Overflow
- Variadic macro - C preprocessor - ## GCC non portable extension
- Detect empty macro arguments – Jens Gustedt's Blog
- Two C++ tricks used in Verdigris implementation
- DEFINITIVE - Replacing text macros - #, ##
- variadic_macros.html
- Variadic macros - ## operator
- Variadic macros | __va_args_
- Source file inclusion in C++ - cppreference.com
- The C Preprocessor: Search Path
- Source file inclusion in C - cppreference.com
- Include directive - h extension - Wikipedia
- C preprocessor = CPP - macros - conditional compilation - CPPFLAGS
- DEFINITIVE - CFLAGS, CPPFLAGS, CXXFLAGS - what exactly do these variables control? - Stack Overflow
- c - Is #if defined MACRO equivalent to #ifdef MACRO? - Stack Overflow
- visual c++ - C++ Preprocessor Standard Behaviour - __va_args__ - macros
- Bootstrapping (compilers) - technique for producing a self-compiling compiler — that is, compiler (or assembler) written in the source programming language that it intends to compile. An initial core version of the compiler (the bootstrap compiler) is generated in a different language (which could be assembly language); successive expanded versions of the compiler are developed using this minimal subset of the language.
- compilation - How can a compiler compile itself? - Stack Overflow
- Additional C/C++ Tooling - Nick Desaulniers
Code_Source_Management-Version_Control_Systems
Git
- How to Use Git Version Control System in Linux [Comprehensive Guide]
- architecture of git command at DuckDuckGo
- Microsoft and GitHub team up to take Git virtual file system to macOS, Linux – Ars Technica
- Please, oh please, use git pull --rebase (Example)
- Introducing security alerts on GitHub · GitHub
- Git - Book
- What's the difference between a fork and clone? | Opensource.com
- The GitHub Tutorial: 10+ hacks to boost your skills - Usersnap
- GitLab vs GitHub: What Are The Key Differences?
- Definitive step-by-step guide to Git | Opensource.com
- A guide to bootstrapping your open source project with GitHub | Opensource.com
- Tig - A Command Line Browser for Git Repositories
- Create a branch in Git from another branch - Stack Overflow
- Git - Wikipedia
- Numerous undo possibilities in Git | GitLab
- How to reset, revert, and return to previous states in Git | Opensource.com
- git - How to discard all changes made to a branch? git checkout -f
- how to discard git local branch changes? git reset --hard
- centralized code source control vs decentralized - Google Search
- source code control vs version control - Google Search
- svn vs git - Google Search
- tfs vs svn - Google Search
- tfs vs git vs svn - Google Search
- Comparison of version-control software - Wikipedia
- List of version-control software - Wikipedia
- Distributed version control system - DVCS - vs centralized source control systems - Wikipedia
- Version control system - VCS - Wikipedia
Project_Management_Softwares
- Track & manage projects or tasks (for a solo developer) - Software Recommendations Stack Exchange
Mobile_Tools
- 10 must have apps for programmers if they want to be professional » TechWorm
- truffleHog - Searches Through Git Repositories For High Entropy Strings And Secrets, Digging Deep Into Commit History - KitPloit - PenTest Tools for your Security Arsenal ☣
- 10 Must Apps for the Programmers if they want to be professional - Coding Security
Projects
Own_Projects
SimpleCLogger
- Logfile - Wikipedia, the free encyclopedia
- GitHub - gabime/spdlog: Fast C++ logging library.
- Log file - Wikipedia
- The Art of Logging - CodeProject
- Logging in C++ - CodeProject
- Logging In C++ | Dr Dobb's
- Logging In C++ | Dr Dobb's
- Logging In C++: Part 2 | Dr Dobb's
- Simple logger for C++ - CodeProject
- hardcodet.net » An Introduction to SLF, the Simple Logging Façade
- CS635: Doc 6, Logging: A Use of Singleton
Building_Compilers
- Writing a minimal x86-64 JIT compiler in C++ | Solarian Programmer
- Writing a C Compiler, Part 5
- Writing a C Compiler, Part 1
- Compiler Design I
Building_Search_Engine
- Anatomy of a relevant search engine (part 1) - CodeProject
- I am planning to make a small scale search engine on my local system; from where should I start? - Quora
- How San Quentin Inmates Built JOLT, a Search Engine for Prison | WIRED
- The secret to being a top developer is building things! Here’s a list of fun apps to build!
- How to develop a virtual disk for Windows - CodeProject
- How to develop your own Boot Loader - CodeProject
- Geeks Gifts: Surprise a Girl with ASCII Art Flowers Program - CodeProject
- GitHub - Cryptogenic/CPP-Easy-Socket: An easy to use, higher abstraction socket class for usage in C++.
Building_Compilers
- ✅ Every time you build a to-do list app, a puppy ? dies ?
- What are some fun projects to try out using an API? - Quora
- Florin Pop - 15+ App Ideas to Build to Level Up Your Coding Skills
- 15 App Ideas to Build and Level Up your Coding Skills
- A list of sample Web App Ideas
- how to build a rss feed reader at DuckDuckGo
- How to Integrate Stripe Payments in Web Application? - Stripe products
- Create a Python powered dashboard in under 10 minutes - plotly
- Build a realtime payment dashboard with Stripe
- Building a Serverless Stripe Analytics Dashboard | Cube.js Blog
- Algorithmics data structures: Data structures - basic implementation - stack, queue, qrray list, linked list, double circular list, binary search tree, AVL tree, red black tree, hash table, heap, floyd algorithm complexity - Template metaprogramming TMP
Local_Bookmarks_URLs_Adpater
- bookmarks - Mozilla | MDN
- Work with the Bookmarks API - Mozilla | MDN
- Startpage.com - The world's most private search engine
FOSS_Projects
Lists
- awesome-cpp: A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things - Memory Allocation malloc, jemalloc, mimalloc, hoard, C smart Pointers - cryptography, bcrypt, beecrypt, crypto++, tiny aes c - Game Engines - Networking, Boost, Asio - Image Processing - Inter Process Communication - Logging - Libraries for parsing and manipulating PDF documents - Regexes -Robotics - VMs - Coding Styles/Standards -
- Little open source projects that made a big impression in 2016 | Opensource.com
Contributing
- Personal projects development - Google Sheets
- best open source project to contribute - Google Search
- Leveraging Open Source - Everything You Wanted to Know About Open Source that Nobody Told You (including getting paid to do it) on Vimeo
- Up For Grabs
- MunGell/awesome-for-beginners: A list of awesome beginners-friendly projects.
- fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
- Algos/C++ at master · faheel/Algos
- RadixEngine/source at master · GlPortal/RadixEngine
- ethminer/ethminer at master · ethereum-mining/ethminer
- The Chromium Projects
- smali/Smali.java at master · JesusFreke/smali
- modern c++ open source projects to contribute for - Google Search
- hioa-cs/IncludeOS: A minimal, resource efficient unikernel for cloud services
- The LLVM Compiler Infrastructure Project
- Boost C++ Libraries
- KDE Community Home - KDE.org
- WebKit and C++11 | WebKit
- Open Whisper Systems
- Home · rapid7/metasploit-framework Wiki
- Contribute on Open Source Friday · GitHub
- radare/radare2: unix-like reverse engineering framework and commandline tools
- installation/rkhunter: Rootkit Hunter install script
- What's the difference between open source software and free software? | Opensource.com
- Stop Calling Everything "Open Source": What "Open Source" Really Means
- I thought I understood Open Source. I was wrong – Hacker Noon
- The Difference Between Free and Open-Source Software | DigitalOcean
- Why Open Source Misses the Point of Free Software - GNU Project - Free Software Foundation
- Free and open-source software - Wikipedia
- Gratis versus libre - Wikipedia
- 7 Ways to Get Better at C++ During this Summer - Fluent C++
- Personal projects development - Google Sheets
Coding_Challenges
Interview_Preparation
Problem_Solving_Skills
- Top 15 data structures and algorithms interview questions - Coding Security
- Here are 20 really tough questions that Google asks during Job Interview » TechWorm
- 30 Toughest Questions Asked In Apple Interviews
- Facebook's toughest job interview questions, try answering them » TechWorm
- 29 Toughest Questions Asked in Facebook Job Interviews
- 11 Questions That Were Asked at SpaceX Internship Interviews
- 41 Toughest Questions Google Will Ask You At Job Interviews
- Most Common Programming Questions in the Interviews about data structures - Coding Security
- 5 Most Common Interview Questions on Algorithms - Coding Security
- rshaghoulian/Cracking-the-Coding-Interview_solutions: Efficient solutions to "Cracking the Coding Interview" (6th Edition) problems
- GitHub - jwasham/coding-interview-university: A complete computer science study plan to become a software engineer.
- Here is the List Of Skills Google Want Its Software Engineers To Have
- GitHub - mission-peace/interview: Interview questions
- rshaghoulian/HackerRank_solutions: HackerRank Solutions - 320 efficient solutions to HackerRank problems
- Get that job at Facebook
- 5 questions you’ll be asked on your first job interview | Monster.com
- Find Jobs in the US. Build a Career. Find Your Calling | Monster.com
- How to avoid clichés that put interviewers to sleep | Monster.com
- 4 Toughest Questions You'll Face at an Entry-Level Interview | Monster.com
- production engineer at DuckDuckGo
- Production Engineering – Facebook Code
- Stevey's Blog Rants: Get that job at Google
- What is it like to be a production engineer at Facebook? How different a role is it from a software engineering role? In terms of compensation, how would you compare the two? - Quora
- Production Engineers at Facebook have a... - Facebook Careers
- Facebook Open Source
- Production Engineering – Facebook Code
- first stage facebook interview at DuckDuckGo
- How should I prepare for a production engineer interview at Facebook? - Quora
- How to get your dream job in tech: 100+ company guides | Pathrise
- Choose the right language for your coding interview - Byte by Byte
- For coding interviews at top tier companies like Google, Facebook, etc., is C a suitable language? - Quora
- Choosing a Programming Language for Interviews & Jobs
- Preparing for a technical interview with programming contests | Facebook
- Preparing for your Software Engineering Interview at Facebook - coding, systems design
- Coding Practice - InterviewBit - Interview Questions and Mocks - Programming - System Design - Shell Scripting, Regex - Databases - Puzzles
- interview-preparation · GitHub Topics · GitHub
- How To Approach Any Algorithm Interview Without Panicking
- The 30-minute guide to rocking your next coding interview
- Part 2: How to prepare for your next coding interview?
- Cracking the Coding Interview v6 Errata & Changes - Google Sheets
- free anonymous technical interview practice - mock interview
Project_Euler
- Archived Problems - Project Euler
- project euler best solutions at DuckDuckGo
- project euler best solutions python at DuckDuckGo
- Interview Practice | CodeFights
- Dashboard | HackerRank
- Refactor yourself. Train your programming skills - Codility
- Coding Games and Programming Challenges to Code Better
- LeetCode - The World's Leading Online Programming Learning Platform
- Train with Programming Challenges/Kata | Codewars
- GeeksforGeeks | A computer science portal for geeks
- UVa Online Judge - Home
- Timus Online Judge
- Codeforces
- CodeKata
- How to prepare for ACM - ICPC? - GeeksforGeeks
- Embedded C Quiz | Barr Group
- Embedded C++ Quiz | Barr Group
Multithreading_Programming
- Multi-Threading The Truth · Our Machinery
- Granularity (parallel computing) - Wikipedia
Graphics_And_Game_Development
- How to Write Your Own C++ Game Engine
- How does screen capture work? - Quora
Web_Development
Web_Browser_Extensions_Development
- Firefox Add-ons WebExtensions State July 2017 - gHacks Tech News
- Browser Extensions | MDN
- Installing extensions - MozillaZine Knowledge Base
- Install a Firefox Add-on Manually
- 11.04 - How to install .xpi file for firefox? - Ask Ubuntu
- How to modify .xpi file(Firef0x addon). – Jagjeet Singh
- Firefox : Mozilla annonce le support officiel des WebExtensions, des extensions qui devraient être compatibles avec les principaux navigateurs
Building_Website
- WordPress.com vs WordPress.org – Which is Better? (Pros and Cons)
- How to Learn WordPress for Free in a Week (or Less)
- 27 Easy Ways to Increase Your Blog Traffic by 406% (for FREE)
- How Much Does It Cost to Build a WordPress Website? (2020)
- How to Make a WordPress Website - Easy Tutorial - Create Website (2020)
- Why is WordPress Free? What are the Costs? What is the Catch?
- How to Choose the Best Domain Name (14 Tips and Tools)
- WordPress.com vs WordPress.org – Which is Better? (Pros and Cons)
- 6 Important Reasons Why You Should Use WordPress for Your Website
- WordPress Hosting - Bluehost
- 7 Best Wix Alternatives in 2020 (More Powerful and Reliable)
- Website Builder: Intelligent, Fast & Free | Constant Contact
- Email Marketing Software | Constant Contact Pricing
- Plans & Pricing with Feature Comparison | Constant Contact
- Constant Contact Review | PCMag
- Constant Contact Review 2020 | Email Marketing and Survey Software Reviews - business.com
- The 21 Best Free Website Builders of 2020: Their Pros & Cons
- The Best Cheap Web Hosting Services for 2020 | PCMag
- The Best Website Builders for 2020 | PCMag
- déménageur - English translation – Linguee
- Startpage.com - The world's most private search engine
- 16 Best Moving and Storage WordPress Themes 2020 - Colorlib
- Top 7 Best Moving Company WordPress Themes for 2020 | Compete Themes
- Best Web Hosting 2020 - Domains - WordPress - Bluehost
- Moving Company Templates from ThemeForest
- 50 greatest drives: UK's best road trips | Boundless by CSMA
- Startpage.com Search results
- Startpage.com Search results
- WordPress vs Drupal - Which One is Better in 2020? (Pros and Cons)
- Startpage.com Search results
- How to Legally Use Images in Your Social Media Marketing : Social Media Examiner
- Download | WordPress.org
- How to install WordPress | WordPress.org
- WordPress Hosting Recommendations | WordPress.org
- WordPress.com Apps - Mobile Apps
- Startpage.com Search results
- BlueHost Review: They’re A Popular Hosting Provider, But Does That Mean They’re The Best? - Digital.com
- Sign Up Now - Bluehost
- Bluehost Review 2020: 7 Things They Don't Tell You (with Screenshots)
- Bluehost Review: 5 Reasons Why Bluehost Is Terrible For Web Hosting
- Bluehost Reviews - 10 Pros & Cons You Should Know in 2020
- BlueHost Review (2020) – Why It’s Simply Not Worth the Hype
- Startpage.com Search results
- wordpress search engine optimization ebooks - All IT eBooks
- WordPress Search Engine Optimization, 2nd Edition.pdf
- Site Tools
- My SiteGround Account
- Home ‹ Déménageur Pro — WordPress
- Request a Quote – WordPress plugin | WordPress.org
- YITH WooCommerce Request A Quote – WordPress plugin | WordPress.org
- How to Create a Request a Quote Form in WordPress
- Startpage.com Search results
Web_APIs-Web_Services
- swagger vs oadf - Google Search
- Get started with REST services with Apache Camel | Opensource.com
- What is REST?
- REST Vs SOAP - What is the difference? | Tech Primers - YouTube
- Laravel API Tutorial: Building & Testing a RESTful API | Toptal
- Understanding And Using REST APIs — Smashing Magazine
- How APIs work — An Analogy For Dummies – Timothy Choi – Medium
- swagger vs oadf - Google Search
- An introduction to microservices | Opensource.com
- API Evangelist
Self-hostable_Web_Apps
- GitHub - bashrc/freedombone: Run your own internet services http://yjxlc3imv7obva4grjae6u3qw527koaytrgjgdp364hmthrst3jodiid.onion
- GitHub - Kickball/awesome-selfhosted: This is a list of Free Software network services and web applications which can be hosted locally. Selfhosting is the process of locally hosting and managing applications instead of renting from SaaS providers. Privacy-respectuous alternative
Advertisement_Developement-Blocking
- how do adblockers work at DuckDuckGo
- Raspberry Pi: Your Very Own Development Server | Toptal
- angular vs node js at DuckDuckGo
- jboss vs node at DuckDuckGo
- how do a website work without javascript - Google Search
- Python eCommerce | Build a Django eCommerce Web Application | Udemy
- Speeding up crypto on Wire desktop apps – Wire – Medium
- GitHub - dest4/stream-audio-fingerprint: Audio landmark fingerprinting as a Node Stream module
- Introducing HumbleNet: a cross-platform networking library that works in the browser – Mozilla Hacks – the Web developer blog
- Building a Simple Web App with Bottle, SQLAlchemy, and the Twitter API - Real Python
- 🙈 A lot of people will hate our tech stack, but here it is
- how url shorteners work at DuckDuckGo
- programmatically determine if a phone number is provided by a regular carrier at DuckDuckGo
- A Framework or a CMS? What is better to choose? | Web and Development
- https://opensource.com/open-organization/18/6/building-professional-social-networks-openly
- Build your first Redis Hello World application in Python | Opensource.com
- A modular network stack - protocol labs
- C++: A language for next generation web apps
- Why is C++ not used in web development? - Quora
- Can C++ be used as a server-side web development language? - Software Engineering Stack Exchange
- Why isn't C++ used to develop web applications? : cpp
- c# - The importance of knowing c++ for web application development - Stack Overflow
- Web framework - client/server-side - AJAX
- Skulpt - Client side web development with Python
Mobile_Development
- xamarin vs ionic vs react native 2017 - Google Search
- free alternatives to xamarin - Google Search
- xamarin vs ionic vs react native 2017 - Google Search
- free alternatives to xamarin - Google Search
- xamarin vs ionic vs react native 2017 - Google Search
- free alternatives to xamarin - Google Search
Augmented_Reality_Development
Apple_ARKit
- occlusion apple arkit - Google Search
- Make Your Own Matrix Movie with This Simple ARKit Demo | Toptal
- occlusion arkit - Google Search
- occlusion arkit - Google Search
- ARKit | Apple Developer Documentation
- GitHub - olucurious/Awesome-ARKit: A curated list of awesome ARKit projects and resources. Feel free to contribute!
- video-quickstart-swift/ARKitExample at master · twilio/video-quickstart-swift · GitHub
- GitHub - artemnovichkov/iOS-11-by-Examples: 👨🏻💻 Examples of new iOS 11 APIs
- arkit-occlusion/Occlusion at master · bjarnel/arkit-occlusion · GitHub
- Virtual Realities - YouTube - YouTube
- Vision | Apple Developer Documentation
- ios-arkit-snippets/Snippets at master · ccabanero/ios-arkit-snippets · GitHub
- GitHub - ccabanero/ios-arkit-landscapeviz: Using ARKit for Landscape visualization
- GitHub - jeffreybergier/Blog-Getting-Started-with-Vision: Blog: Getting Started with Vision on iOS 11
- ARKit Tutorial with SceneKit | iOS Swift Tutorials by Jameson Quave
- Super Impressive and Easy Face Detection using Vision API in Swift 4 - YouTube
- iOS ARKit Tutorial: Drawing in the Air with Bare Fingers | Toptal
- occlusion apple arkit - Google Search
- ARKit + Vision: An intriguing combination
- Core ML | Apple Developer Documentation
- ios - How is facial recognition built into Core ML vision framework - Stack Overflow
- Core ML and Vision: Machine Learning in iOS 11 Tutorial
- GitHub - ccabanero/ios-coreml-snippets: Code snippets using CoreML - an iOS framework for running trained Machine Learning models.
- Swift CoreML Image Recognition Tutorial - Seemu AppsSeemu Apps
- CoreML: Real Time Camera Object Detection with Machine Learning - Swift 4 - YouTube
- CoreML-in-ARKit/ViewController.swift at master · hanleyweng/CoreML-in-ARKit · GitHub
- occlusion arkit - Google Search
Cross-Platform_Portability
- Porting - Wikipedia
- newlines - What's the point in adding a new line to the end of a file? - Unix & Linux Stack Exchange
Resources
- Rosetta Code - equivalence between programming languages
- World's five most difficult programming languages to learn » TechWorm
- Dashboard | Codecademy
- Top 5 smartphone apps to learn programming on the go » TechWorm
- 5 Android Apps Every Programmer Must have
- 18 open source translation tools | Opensource.com
- Eli Bendersky's website
- ZeroMQ, nanomsg, libdill, Cartesian softwares - misc prorgamming, software engineering thoughts
- What I Wish I'd Known When I Started Functional Programming
- Code golf - Wikipedia
Graphical_Design
User_Experience_Design
- The Most Important Rule in UX Design that Everyone Breaks
Text-based_User_Interface
- curses (programming library) - Wikipedia
- Text-based user interface - Terminal User Interface - TUI - Wikipedia
Testing
GoogleTest
- googletest - error during making GTest - definitive installation guide of gtest via apt get
- c++ - Including gtest libraries in Makefiles for unit test files - LD_LIBRARY_PATH, /etc/ld.so.conf - -l, -L flags - /usr/lib default libraries directory by linker - definitive linking against library gcc/g++
- GitHub - google/googletest: Googletest - Google Testing and Mocking Framework
- Google Test Official Documentation - main function
- How to build Google Test and Google Mock Libraries
- Google Mock library Official Documentation - How to Build
- c++ - GoogleTest vs CppUnit: The facts - Stack Overflow
CUnit
- CUnit Home
- CUnit: Main Page - doxygen doc
- CUnit - Table of Contents
- TDD using CUnit: First Steps - testing
- Introduction to C Unit Testing (CUnit)
- CuTest: The Cutest C Unit Testing Framework
- CUnit Example
- CUnit - Introduction
CppUTest
- cpputest/CheatSheetTest.cpp at master · cpputest/cpputest · GitHub
- CppUTest - Official site - How to install - coverage report with lcov
- Cpputest - Official Documentation - manual
- GitHub - cpputest/cpputest: CppUTest unit testing and mocking framework for C/C++
- Mock object - Wikipedia
- List of unit testing frameworks - Wikipedia
- Unit Testing C Code - aceunit vs gnu autounit vs cUnit vs CUnit vs CuTest vs CppUnit vs embUnit for embedded systems vs MinUnit vs CUnit for Mr Ando vs CMocka vs Criterionvs HWUT vs CGreen - GoogleTest
- xUnit - Wikipedia
- Unit Testing and Coding Best Practices for Unit Tests: A Test-Driven Perspective | single responsiblity principle SOLID - dependency injection
- Hamcrest - Software testing technique - Assertions styles - supports creating customized assertion matchers - Hamcrest is an anagram of matchers
- Using Hamcrest for testing - Tutorial
- Write a Test Case - Nick Desaulniers
- Test Driven Development book source code - jlangr/c2: Chapter First Example
- Test-driven development and unit testing with examples in C++
- Is Unit Testing worth the effort? - Stack Overflow
- Why Most Unit Testing is Waste - Python Testing
Methodologies
DevOps
- Stumped by DevOps? Experts share their views on how to do DevOps right – GeekWire
- Top Three Reasons Why We Like Ansible - DZone DevOps
- How to avoid getting hoodwinked by a DevOps hustler • The Register
- A complete beginner's guide to DevOps best practices
Agile
- So you're 'agile', huh? I do not think it means what you think it means • The Register
- Exploring the open development method | Opensource.com
- How to be more productive by focusing on the right things (for programmers)
- To self-doubting developers: are you good enough? – freeCodeCamp
- How to think like a programmer — lessons in problem solving
Company-Wise
- Star certification | Ethical hacking, Cyber security, Software certification
- 5 Awesome ways Developers Can Make Extra Money From Home
- The Innovator's Dilemma - Wikipedia
- The Rise of ``Worse is Better'' - tech ideas
- Tips for using Twitter to promote your open source projects | Opensource.com
Resources
- Top 5 YouTube Channels to Learn Programming
- 5 Lessons to Become a Really Good Self-Taught Programmer
- How to Be An Insanely GOOD Developer – Hacker Noon
- 11 technologies developers should explore now | InfoWorld
- Steve Friedl's Home Page
Cyber_security
Cyber-Security_and_Hacking_Learning
Methodologies_Blueprints_Skills
- ISECOM - Open Source Security Testing Methodology Manual (OSSTMM)
- osstmm methodology at DuckDuckGo
Attack_Process
Reconnaissance-Planning
Passive_Reconnaissance-Information_Gathering-Footprinting
OSINT-SOCMINT
Dorking
- Google hacking - Wikipedia
- Google Hacking Database, GHDB, Google Dorks
- Google Hacking Database (GHDB) - Offensive Security
- Google Dorking
- How to Use Google to Hack(Googledorks) « Null Byte :: WonderHowTo
- Top Five Ways the Red Team breached the External Perimeter
- What is 'Google dorking' and what is the defense against this problem? - Quora
- Google Hacking: What is a Google Hack?
- GitHub - utiso/dorkbot: Command-line tool to scan Google search results for vulnerabilities
- How to make advanced search on Google using Google Dorking » TechWorm
- Google Dorks - PenTestIT
Non_Private_Search_Engines
- Baidu - 百度一下
- Baidu - Wikipedia
- Top 5 Chinese Search Engines You Need to Care About (2019)
- Binsearch -- Usenet search engine
- Datasploit - An OSINT Framework To Perform Various Recon Techniques On Companies, People, Phone Number, Bitcoin Addresses, Etc., Aggregate All The Raw Data, And Give Data In Multiple Formats - KitPloit - PenTest Tools for your Security Arsenal ☣
- Video: How to Use Maltego to Research & Mine Data Like an Analyst « Null Byte :: WonderHowTo
- raven - Linkedin Information Gathering Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - jivoi/awesome-osint: A curated list of amazingly awesome OSINT
- OSINT : Chasing Malware + C&C Servers – secjuice™ – Medium
- gOSINT - Open Source Intelligence Framework - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - famavott/osint-scraper: Social Recon
- GasMask - Information Gathering Tool (OSINT) - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - Te-k/harpoon: CLI tool for open source and threat intelligence
- Bizapedia - Find Companies, People, Addresses, Phone Numbers, & Trademarks
- Top Five Open Source Intelligence (OSINT) Tools
- Compass Security OSINT Cheat Sheet - osint_cheat_sheet.pdf
- How to Use Facial Recognition to Conduct OSINT Analysis on Individuals & Companies « Null Byte :: WonderHowTo
- Scammers abused Facebook phone number search - BBC News
- How to Find Anyone's Private Phone Number Using Facebook « Null Byte :: WonderHowTo
- Tinfoleak v2.4 - The Most Complete Open-Source Tool For Twitter Intelligence Analysis - KitPloit - PenTest Tools for your Security Arsenal ☣
- Open Source Intelligence (W40) - Hakin9 - IT Security Magazine
- Offensive and Defensive Doxing · AnarchoTechNYC/meta Wiki · GitHub
- how to know the location of an ip address - Google Search
- Hack Like a Pro: How to Conduct Passive Reconnaissance of a Potential Target « Null Byte :: WonderHowTo
- how to know the location of an ip address - Google Search
- Whois Gateway
Active_Reconnaissance-Scanning-Fingerprinting
DNS_Analysis
- DNSdumpster.com - dns recon and research, find and lookup dns records
- GitHub - nethunteros/punter: Hunt domain names using DNSDumpster, WHOIS, Reverse WHOIS, Shodan, Crimeflare
Vulnerabilties_Assessment-Scanning
Scanning_Techniques
Vulnerabilities_Search_Engines-Scanners
- Shodan
- Shodan (website) - Wikipedia
- Censys
- Punk.sh
- Acunetix Vulnerability Scanner: Web Application Security
- Archery - Open Source Vulnerability Assessment And Management Helps Developers And Pentesters To Perform Scans And Manage Vulnerabilities - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to Use Dorkbot for Automated Vulnerability Discovery « Null Byte :: WonderHowTo
- 5 Hacker-Friendly Search Engines You Must Use - Deep Dot Web
- Shodan Queries - PenTestIT
- Do you like Shodan? You will love Censys! – So Long, and Thanks for All the Fish
- Finding All the Things with Shodan and Censys | Andrew McNicol | Pulse | LinkedIn
- A Search Engine for the Internet’s Dirty Secrets - MIT Technology Review
- Is Shodan Really the World's Most Dangerous Search Engine? - VICE
- What are IoT search engines Shodan and Censys and what are they capable of – Kaspersky Lab official blog
- BuckHacker: This Search Engine Lets You Find Hackable Servers With Ease
- Online Vulnerability Scanners and Network OSINT | HackerTarget.com
- Hack Like a Pro: How to Find Vulnerable Webcams Across the Globe Using Shodan « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Find Website Vulnerabilities Using Wikto « Null Byte :: WonderHowTo
- How to Discover Computers Vulnerable to EternalBlue & EternalRomance Zero-Days « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Find Vulnerabilities for Any Website Using Nikto « Null Byte :: WonderHowTo
- How to Spider Web Pages with Nmap for SQLi Vulnerabilities « Null Byte :: WonderHowTo
- Researcher released a free EternalBlue vulnerability scanner - Security Affairs
- Hack Like a Pro: How to Find Vulnerable Targets Using Shodan—The World's Most Dangerous Search Engine « Null Byte :: WonderHowTo
Nmap
- Hack Like a Pro: How to Conduct Active Reconnaissance and DOS Attacks with Nmap « Null Byte :: WonderHowTo
- How to Get Started Writing Your Own NSE Scripts for Nmap - Script Engine - « Null Byte :: WonderHowTo
- Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know « Null Byte :: WonderHowTo
- Top 32 Nmap Command Examples For Linux Sys/Network Admins - nixCraft
- Nmap Cheat Sheet
- 20 Awesome Nmap Command Examples - ShellHacks
- what scanning tools are unlikely to set off network IDS? - Information Security Stack Exchange
- Nmap Cheat Sheet v1.1 - NmapCheatSheetv1.1.pdf
- Nmap Cheat Sheet and Pro Tips | HackerTarget.com
- Scan Your Home Network With Nmap | -sP argument
- Ethical Hacking: Scanning Networks | Pluralsight
- Scanning Networks in Ethical Hacking, Port Scanning and Network Scanning
- NMapGUI - Advanced Graphical User Interface for NMap - KitPloit - PenTest Tools for your Security Arsenal ☣
- CyberScan - Tool To Analyse Packets, Decoding , Scanning Ports, And Geolocation - KitPloit - PenTest Tools for your Security Arsenal ☣
- VHostScan - Virtual Host Scanner - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to create port scanner using C programming language - Coding Security
- scan home network at DuckDuckGo
- GitHub - urbanadventurer/WhatWeb: Next generation web scanner
- Home - Arachni - Web Application Security Scanner Framework
- Wapiti : a Free and Open-Source web-application vulnerability scanner in Python for Windows, Linux, BSD, OSX
- An Introduction to HTTP Fingerprinting
- Hack Like a Pro: How to Fingerprint Web Servers Using Httprint « Null Byte :: WonderHowTo
- Nikto, NMap , Skipfish and friends – VulPoint
- Hack Like a Pro: How to Scan the Internet for Heartbleed Vulnerabilities « Null Byte :: WonderHowTo
TLS_Assessment
- Generate Mozilla Security Recommended Web Server Configuration Files
- SSL Server Rating Guide · ssllabs/research Wiki · GitHub
- SSL Checker - Check server TLS/SSL setup and vulnerabilities
- Qualys SSL Labs
Uncovering_Zero_Days
Code_Analysis
Native_Code_Analysis
- Csmith
- Finding and Understanding Bugs in C Compilers - csmith - pldi11-preprint.pdf
- ibm purify at DuckDuckGo
- microsoft app verifier at DuckDuckGo
- insure plus plus at DuckDuckGo
- valgrind at DuckDuckGo
- AddressSanitizer · google/sanitizers Wiki · GitHub
- AddressSanitizer — Clang 8 documentation
- The Art of 0-Day Vulnerabilities, Part 1: STATIC ANALYSIS « Null Byte :: WonderHowTo
- AddressSanitizer - ASan - Wikipedia
Fuzzing_Theory_and_Practice
- g cppcon fuzzy testing at DuckDuckGo
- GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause an
- Fuzzing - Fuzz Testing
- fuzzing - How can I fuzz standalone applications? - Information Security Stack Exchange
- appsec - Where can I find a solid BURP tutorial? - Information Security Stack Exchange
- Part 4: Fuzz testing techniques: unfuzzing the fuzzing - YouTube
- Burp suite - Wikipedia
- afl-unicorn: Part 2 — Fuzzing the ‘Unfuzzable’ – Hacker Noon
- Practical fuzzing for pentesters (W34) - Pentestmag
- Machine learning for effective fuzzing - CloudFuzz - payatu
- Simple IMAP Fuzzer - Metasploit Unleashed
- Hacker Lexicon: What Is Fuzzing?
- The Art of 0-Day Vulnerabilities, Part2: Manually Fuzzing « Null Byte :: WonderHowTo
- OWASP Testing Guide Appendix C: Fuzz Vectors - OWASP
Vulnerabilities_Underground_Markets
- A Spyware Company Audaciously Offers ‘Cyber Nukes’ - Motherboard
- How a Tiny Startup Became the Most Important Hacking Shop You’ve Never Heard Of - Motherboard
- Vulnerabilities Dark Market - Hacking As A Service -russian-underground-101.pdf
- Market for zero-day exploits - vulnerability markets
Responsible_Disclosure
- Responsible Vulnerability Disclosure Process - RFC - draft-christey-wysopal-vuln-disclosure-00 -
- Vulnerability (computing) - security - attack surface
- Vulnerability assessment - Wikipedia
- Category:Vulnerability - OWASP
- CWE - Common Weakness Enumeration
- Vulnerability Search Databases
- Why Do Multiple CyberSecurity Researchers Suddenly Discover The Same Vulnerabilities After So Many Years - Joseph Steinberg
- PenTest: Notorious Netcat - Pentestmag - SQL injection - Buffer overflow - HTTPS Attack -
- CVE security vulnerability database. Security vulnerabilities, exploits, references and more - CVSS
- NVD - national vulnerbaility databse NIST - National Insitute for Standard and Technology - Home
- materials/web-extension at master · paper-materials-crowd-sourced/materials · vulnerabilities spotting browser extension - vulnerability assessment
- Copying code from Stack Overflow? You might paste security vulnerabilities, too - vulnerability assessment
Network_Enumeration
- Network enumeration - Wikipedia
- What is Enumeration?
- Enumeration Phase in Ethical Hacking
- Subfinder - Subdomain Discovery Tool That Can Discover Massive Amounts Of Valid Subdomains For Any Target - KitPloit - PenTest Tools for your Security Arsenal ☣
- GitHub - Ice3man543/subfinder: SubFinder is a subdomain discovery tool that can discover massive amounts of valid subdomains for any target. It has a simple modular architecture and has been aimed as a successor to sublist3r project.
- DNS tools | Manage Monitor Analyze | DNSstuff
- scan home network nmap at DuckDuckGo
- nmap - How to find live hosts on my network? - Information Security Stack Exchange
- GitHub - utiso/senf: sensitive number finder
- Whois Lookup Captcha
- Reconnaissance - Application Security Wiki
- Hack Like a Pro: How to Use Netcat, the Swiss Army Knife of Hacking Tools - definitive guide - create backdoor - « Null Byte :: WonderHowTo
- subjack - Hostile Subdomain Takeover tool written in Go - KitPloit - PenTest Tools for your Security Arsenal ☣
- Hack Like a Pro: How to Conduct Active Reconnaissance on Your Target with hping3 « Null Byte :: WonderHowTo
- Hack Like a Pro: Abusing DNS for Reconnaissance « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Exploit SNMP for Reconnaissance « Null Byte :: WonderHowTo
- New Tool Automatically Finds and Hacks Vulnerable Internet-Connected Devices - Motherboard
- penetration test - What is the difference between active reconnaissance and scanning/enumeration - Information Security Stack Exchange
- GitHub - fuzzdb-project/fuzzdb: Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
- Web Application finger printing - Anant Shrivastava
- GitHub - aboul3la/Sublist3r: Fast subdomains enumeration tool for penetration testers
- Intrigue-Core - Discover Your Attack Surface - KitPloit - PenTest Tools for your Security Arsenal ☣
- Domain Analyzer - Analyze The Security Of Any Domain By Finding All the Information Possible - KitPloit - PenTest Tools for your Security Arsenal ☣
- Recon « Null Byte :: WonderHowTo
- Hack Like a Pro: Reconnaissance with Recon-Ng, Part 1 (Getting Started) « Null Byte :: WonderHowTo
- Foot printing and Reconnaissance Tutorial
- Intelligence Gathering - The Penetration Testing Execution Standard
- Ethical Hacking: Reconnaissance/Footprinting | Pluralsight
- Performing and Analyzing Network Reconnaissance | Pluralsight
- Top 20 Data Reconnaissance and Intel Gathering Tools
- D0xk1t - Web-based OSINT and Active Reconaissance Suite - KitPloit - PenTest Tools for your Security Arsenal ☣
- Techniques: PRE-ATT&CK - MITRE ATT&CK - information gathering, reconnaissance techniques, OSINT,active/passive scanning -capabilities hackers must have - malware spreading distribution - OPSEC
Exploitation-Gaining_Access
Evading_Detection
Malware_Scanning
- Operator of VirusTotal Like Malware-Scanning Service Jailed for 14 Years
- New AI system DARKMENTION will detect upcoming cyberattacks from dark web
- Munin - Online Hash Checker For Virustotal And Other Services - KitPloit - PenTest Tools for your Security Arsenal ☣
- Malware has no trouble hiding and bypassing macOS user warnings – Ars Technica
- Hacker gets a whopping 14 years in prison for running Scan4You service | ZDNet
- ZombieBoy cryptomining malware exploits CVEs to evade detection
- Linux kernel 3+ system call table modification detection - Information Security Stack Exchange
Covering_Tracks
- how to remotely delete rootkit from target machine - Google Search
- how to remotely delete rootkit from target machine - Google Search
- Invoke-Phant0m - Windows Event Log Killer - KitPloit - PenTest Tools for your Security Arsenal ☣
- Log Killer - Clear All Your Logs In (Linux/Windows) Servers - KitPloit - PenTest Tools for your Security Arsenal ☣
- Evading AV Software « Null Byte :: WonderHowTo
- Hacking Windows 10: How to Create an Undetectable Payload, Part 1 (Bypassing Antivirus Software) « Null Byte :: WonderHowTo
- Dr0p1t-Framework 1.3.2.1 - A Framework That Creates An Advanced FUD Dropper With Some Tricks - KitPloit - PenTest Tools for your Security Arsenal ☣
- Malware detection in 9 easy steps | CSO Online
- Stuxnet-style code signing is more widespread than anyone thought | Ars Technica
- The Rise of Super-Stealthy Digitally Signed Malware—Thanks to the Dark Web
- How you can detect hackers in your encrypted traffic
- Intrusion detection system - Wikipedia
- Suricata tool is an open source network IDS- interview with Victor Julien - Pentestmag
- Process Doppelgänging: New Malware Evasion Technique Works On All Windows Versions
- The Anti-Malware Guide: 9 Virus Removal Tips And Tricks - GameSpot
- AVGater Malware uses Antivirus to infect host
- Antivirus tools are not good enough, says Google’s senior security engineer » TechWorm
- Cisco's new tool will detect malware in encrypted traffic
- Malware Analysis For Hedgehogs
- GitHub - LordNoteworthy/al-khaser: Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.
- Tutorial: Creating Yara Rules for Malware Detection — PoC || GTFO
- GitHub - Eitenne/TopHat: Fully undetected backdoor with RSA Encrypted shell
- Evading Anti-virus Part 1: Infecting EXEs with Shellter
- 42250-how-to-write-fully-undetectable-malware---english-translation.pdf
- inside-scan4you-takedown
- First-Ever Ransomware Found Using ‘Process Doppelgänging’ Attack to Evade Detection
- Intel Processors Now Allows Antivirus to Use Built-in GPUs for Malware Scanning
- Detection of Intrusions and Malware, and Vulnerability Assessment | SpringerLink
- Answer - Quora
- red team how to succeed by thinking like the enemy pdf - Google Search
- Telegram Vulners Bot - Exploit Search Engine And Security Feed In Your Pocket - KitPloit - PenTest Tools for your Security Arsenal ☣
- Getsploit v0.2.2 - Command Line Utility For Searching And Downloading Exploits - KitPloit - PenTest Tools for your Security Arsenal ☣
Cryptography_Protocols-Cryptanalysis
Fundamentals
- Cloudflare Embraces Google Roughtime, Giving Internet Security a Boost | WIRED
- Why You Don't Roll Your Own Crypto - Motherboard
- What is NIST's guidance on lightweight cryptography?
- difference password cryptographic key at DuckDuckGo
- Information-theoretic/Unconditional/Provable/Unbreakable security - Perfect Security/Secrecy is a special case - OTP One Time Pad - Claude Shannon - quantum cryptography
Building_Cryptographic_Primitives
- Hidden in Plain Sight - Public Key Crypto - Nick Desaulniers
- All Your base64 are Different To Us - CodeProject
- SharpPrivacy - OpenPGP for C# - CodeProject
- A Beginner's Tutorial for Understanding and Implementing Password Hashing and Salting - CodeProject
TLS-HTTPS
Attacks_On_TLS
- tls - How to audit web servers for resistance/vulnerability to BREACH - Information Security Stack Exchange
- ROBOT Attack: 19-Year-Old Bleichenbacher Attack On Encrypted Web Reintroduced
- I, Robot? Aiiiee, ROBOT! RSA TLS crypto attack pwns Facebook, PayPal, 27 of 100 top domains • The Register
- tls - Tools to test for BEAST/CRIME that AREN'T Internet-based? - Information Security Stack Exchange
- TLS breach attack - Acunetix
- The Breach Attack
- Defending against the BREACH Attack | Qualys Blog
- SSL/TLS attacks: Part 3 – BREACH Attack - Checkmate
- SSL/TLS attacks: Part 1 – BEAST Attack - Checkmate
- GitHub - dionyziz/rupture: A framework for BREACH and other compression-based crypto attacks
- How to Disable WPAD on Your PC So Your HTTPS Traffic Won't Be Vulnerable to the Latest SSL Attack « Null Byte :: WonderHowTo
- What Every Developer Must Know About HTTPS | Pluralsight
- Session Hijacking, why SSL doesn't always mean secure
- is possible to mitm https - Google Search
- HTTPS Certificate Revocation is broken, and it’s time for some new tools | Ars Technica
- SSL spy boxes on your network getting you down? But wait, here's an IETF draft to fix that • The Register
- Nope, this isn’t the HTTPS-validated Stripe website you think it is | Ars Technica
- Brief(ish) explanation of how https works
- Mixed content blocking in Firefox | Firefox Help
- SSL: "point to point security" vs "end to end security"? - Server Fault
- What's the difference between end-to-end and regular TLS encryption? HTTPS - verifiable, S/MIME
- Transport Layer Security - TLS, SSL - Secure Network Programming SNP
- Secure Network Programming - SSL
PGP
- Researchers Crack 1024-bit RSA Encryption in GnuPG Crypto Library
- GnuPG Flaw in Encryption Tools Lets Attackers Spoof Anyone's Signature
- Decade-old Efail flaws can leak plaintext of PGP- and S/MIME-encrypted emails | Ars Technica
- EFail: Encrypted Email Has a Major, Divisive Flaw | WIRED
- PGP and S/MIME protected emails prone to exposure
- Here's How eFail Attack Works Against PGP and S/MIME Encrypted Emails
SSH
- LibSSH Flaw Allows Hackers to Take Over Servers Without Password
- Multiple Ways to Secure SSH Port
- Wikileaks Unveils CIA Implants that Steal SSH Credentials from Windows & Linux PCs
- How I’ve captured all passwords trying to ssh into my server!
- Understanding the SSH Encryption and Connection Process - definitive guide - definitive
- How to Limit SSH Users to RSYNC and SCP using RSSH | Linux Support in Adelaide & Melbourne - rssh - ssh server
- ssh-agent forwarding and sudo to another user - Defaults env_keep+=SSH_AUTH_SOCK - keeping environment variable whith sudo - sudoers file
Breaking_Hashes
Hashing
Salts
- encryption - Can you help me understand what a cryptographic "salt" is? - Cryptography Stack Exchange
- What is a hash?
- security - Difference between Hashing a Password and Encrypting it - Stack Overflow
Piece_Wise_Hashing
- piecewise hash at DuckDuckGo
- fuzzy hashes at DuckDuckGo
- piecewise hash vs fuzzy hash at DuckDuckGo
- Piecewise hashing - ForensicsWiki
- Context Triggered Piecewise Hashing - ForensicsWiki
- c - What is benefit to use context trigger piecewise hashing over traditional piecewise hashing? - Stack Overflow
- Piecewise hashing - ForensicsWiki
- How to decode password hash using CPU and GPU - Coding Security
- Hashcat v4.0 - World's Fastest and Most Advanced Password Recovery Utility - KitPloit - PenTest Tools for your Security Arsenal ☣
- Hashcat 4.0.0 now can crack passwords and salts up to length 256Security Affairs
- Hate_Crack - Automated Hash Cracking Techniques with HashCat - KitPloit - PenTest Tools for your Security Arsenal ☣
Data_Integrity
Digital_Signature
- How to Use an SHA-256 Hash to Verify Your Downloads Haven't Been Modified « Null Byte :: WonderHowTo
- On the insecurity of math.random and it’s siblings – Insinuator.net
Digital_Certificates
- Abusing X.509 Digital Certificates to establish a covert data exchange channelSecurity Affairs
- The Market of Stolen Code-Signing Certificates Is Too Expensive for Most Hackers
Steganography
- GitHub - RobinDavid/LSB-Steganography: Python program to steganography files into images using the Least Significant Bit.
Cryptolinguistics
- What language did Native American use in WW2? - Quora
- What Native American Language Did the US Military Use as an Unbreakable Code During WWII? | Synonym
- World War I’s Native American Code Talkers - HISTORY
- Is it true that without the Rosetta Stone we would've never been able to decipher hieroglyphics? Why? - askscience
- if_we_had_never_discovered_the_rosetta_stone
- Cryptolinguistics: If the Rosetta Stone had never been discovered, would computers now be able to decipher ancient Egyptian hieroglyphs? - Quora
- How were the Hieroglyphics deciphered? - Quora
- WindsorGreen : les plans de la NSA pour casser les chiffrements auraient été découverts en libre accès sur Internet, par un chercheur en sécurité
- tls - Does hashing a file from an unsigned website give a false sense of security? - Information Security Stack Exchange
- ubuntu - How does apt-get checks for the integrity of the files downloaded? - Super User
- IEEE P1735 Encryption Is Broken—Flaws Allow Intellectual Property Theft
- Millions of high-security crypto keys crippled by newly discovered flaw | Ars Technica
- Flaw crippling millions of crypto keys is worse than first disclosed | Ars Technica
- 'Crypto Anchors' Might Stop the Next Equifax-Style Megabreach | WIRED
- PenTest: Cryptography for pentesters - Pentestmag
- Cryptanalysis for pentesters (W39) - Pentestmag
- Shellcode: Encryption Algorithms in ARM Assembly | modexp
- ROT-13 Online Encryptor & Decryptor
- An introduction to cryptography and public key infrastructure | Opensource.com
- Cryptography – Practical Networking .net
Off-The-Records_Messaging_Protocol
- OTR.im - Whispering Off The Record
- Internet Relay Chat (IRC) with Off the Record (OTR) Encryption
- Off-the-Record Messaging - OTR - forward secrecy , malleable/deniable encryption - Pidgin, Kopete
- IRC with SSL and OTR encryption – /INPUT/IS/EVIL/
- Off-the-Record Messaging
- Off-the-Record Communication,or, Why Not To Use PGP
- tls - Is there any advantage on using OTR in a messaging app if the messages are first sent to a REST API server over HTTPS? TLS/SSL
- Off The Record - what it is and why we recommend it for communications security | The Calyx Institute
- Link encryption - vs End to End Encryption vs Bulk Encryption
- Multiple encryption - aka cascade encryption, cascade ciphering, multiple encryption, and superencipherment. Superencryption refers to the outer-level encryption of a multiple encryption
- End-to-end encryption - E2EE - MitM, endpoint security, backdoors
- End-to-end email encryption. What is it and how does it work?
- End-to-end encryption vs link encryption
- Simple Authentication and Security Layer - complement to SASL
- Instant Messaging Security - privacy, anonymity - OTR encryption, TLS - Adium, Pidgin, Digsby - XMPP
Breaking_Authentification
Authentication_Schemes
FaceId_Auth
- Why Cops Can Use Face ID to Unlock Your iPhone | WIRED
HTTP_basic_access_authentication
- Basic access authentication - HTTP-authentication - Wikipedia
- How to set-up HTTP Authentication (Basic) with Nginx on Ubuntu 16.04 - Acunetix
MultiFactor_Auth
- This Tool Can Hack Your Accounts Even with Two-Factor Authentication - ExtremeTech
- You Should Be Using Two-Factor Authentication on Everything - Motherboard
- Why mobile two-factor authentication is better than biometrics
- What is Two Factor Authentication (2FA) And Why Use It?
- How does Google Authenticator work? - HOTP HMAC based OTP, TOTP Time based OTP
- Two-Factor Authentication for Beginners - Apps
Password_Managers
- Google's New Smart Lock Is the Password Manager for the Rest of Us
- What's the difference between OpenID and OAuth? - Stack Overflow
- How Password Managers Work And Why You Should Use One - Motherboard
- Best Password Manager — For Windows, Linux, Mac, Android, iOS and Enterprise
- Open source alternatives to LastPass | Opensource.com
Fingerprint_Scan_Auth
- How do fingerprint scanners work - Explain that Stuff
- Apple’s Secure Enclave Processor (SEP) Firmware Decrypted | Hackaday
Pattern_Locks
- How To Unlock Pattern Lock On Android Phone (3 Ways) – Incognisys
Auth0
- Authentication Bypass Vulnerability Found in Auth0 Identity Platform
- Authentication Cheat Sheet - OWASP
- How to Protect Your Digital Self: 2FA, Password Managers, Safe Browsing | WIRED
- Est-il préférable ou non de permettre aux internautes de coller leurs mots de passe lorsqu'ils s'authentifient ?
- What Is Two-Factor Authentication and Why You Should Use It - Motherboard
- how to hack accounts protected with 2 fa - Google Search
- Cardiac Scan Authentication — Your Heart As Your Password
- Plug The Security Holes In Your Two-Factor Authentication
- Do you use SMS for two-step verification? Don't. - CNET
- Two-Step vs. Two-Factor Authentication - Is there a difference? - Information Security Stack Exchange
- Multi-factor authentication - Wikipedia
- Multi-Factor Authentication vs Two Step Verification. - QuickBooks Learn & Support
- Hackers Show Proofs of Concept to Beat Hardware-Based 2FA - Motherboard
- Synthetic, Microscopic Fingerprints Turn Tiny Plastic Particles Into Security Keys
- What is OpenID? | OpenID
- Effects of Biometrics Co-Used with Password - Pentestmag
- How to Build an FTP Password Cracker with Ruby
- security-risks-of-logging-in-with-facebook
- security - The definitive guide to form-based website authentication - Stack Overflow
Credentials_Retrieval_and_Storage_in_Software
- Storing private asymmetric key in application binary? - Information Security Stack Exchange
- How should an application store its credentials - Information Security Stack Exchange
- How can I secure the secret key? - Information Security Stack Exchange
- What's more secure? Hard coding credentials or storing them in a database? - Information Security Stack Exchange
- Is it safe to store a password in compiled code? - Information Security Stack Exchange
- Hiding a password in a python script (insecure obfuscation only) - Stack Overflow
- How to Use Encrypted password in shell script AIX - Unix & Linux Stack Exchange
- How do I hide my mySQL login info in my php script? - Stack Overflow
- Encrypt passwords in powershell scripts - Virtual to the Core
- Can a script be executable but not readable? - Unix & Linux Stack Exchange
- How can I avoid putting the database password in a perl script? - Information Security Stack Exchange
- Password Discovery and Patching by Disassembling: Explained
- Architecture - Vault by HashiCorp
- Is storing passwords associated with system processes and binaries in an encoded format acceptable? - Information Security Stack Exchange
- How to avoid scripts with hardcoded password? - Information Security Stack Exchange
- Best practice for storing credential in data center - Information Security Stack Exchange
- Best practices for storing credentials used by code - config file password vs encrypted password with hidden encryption key Information Security Stack Exchange
- Securely store passwords in a mobile application - Information Security Stack Exchange
Passwords_Sharing_Risks
- IT will only give password over phone - but is that really more secure than email? - Information Security Stack Exchange
Mimikatz-like_Tools
- how does mimikatz work - Google Search
- Open Security Research: Using Mimikatz to Dump Passwords!
- How to Steal Windows Credentials with Mimikatz and Metasploit
- Defending Against Mimikatz | Jim Shaver
- gentilkiwi/mimikatz: A little tool to play with Windows security
Password_Strength
- Password strength - Wikipedia
- Why you can’t trust password strength meters – Naked Security
- Is it acceptable practice to only increment a number when changing a password? - Information Security Stack Exchange
- Why Multi-word Phrases Make for More Secure Passwords Than Incomprehensible Gibberish
- The Only Secure Password Is the One You Can’t Remember
- Troy Hunt: How Long is Long Enough? Minimum Password Lengths by the World's Top Sites
- A brief history of bad passwords | Opensource.com
- Why So Many People Make Their Password 'Dragon' | WIRED
Password_Locked_Resources
- How secure a secured PDF really is? - Information Security Stack Exchange
- What security scheme is used by PDF password encryption, and why is it so weak? - Information Security Stack Exchange
- password locked pdfs how secure site:security.stackexchange.com at DuckDuckGo
- password locked file how secure site:security.stackexchange.com at DuckDuckGo
- encryption - How secure is a password protected file? - Information Security Stack Exchange
- How good is PDF password protection? - Super User
- PDFCrack | How to Crack Password of PDF Files?
- Cracking Password Protected .PDF Files with John The Ripper – Netlock Security
- Recover Lost PDF Passwords with pdfcrack (Linux)
- Linux / FreeBSD: PDFCrack A Command Line Password Recovery Tool For PDF Files - nixCraft
- pwned - A command-line tool for querying the 'Have I been pwned?' service - KitPloit - PenTest Tools for your Security Arsenal ☣
- how does local session password work - Google Search
- Hack Like a Pro: How to Crack Passwords, Part 1 (Principles & Technologies) - Basics « Null Byte :: WonderHowTo
- How Hackers Take Your Encrypted Passwords & Crack Them « Null Byte :: WonderHowTo
- SpyEye - Wikipedia
- Holy DUHK! Boffins name bug that could crack crypto wide open • The Register
- DUHK Crypto Attack Recovers Encryption Keys, Exposes VPN Connections, More
- How to crack password of zip files using python - Coding Security
- Top 10 Password Cracking Techniques Used By Hackers
- Brute-Forcing HTML Form Authentication Using Python
- How to sniff password using Wireshark - Coding Security
- How to break a CAPTCHA system in 15 minutes with Machine Learning
- CAPTCHA - Wikipedia
- Challenge–response authentication - Wikipedia
- Replay attack - Wikipedia
- New Tools Make Checking for Leaked Passwords a Lot Easier
- Default Passwords | CIRT.net
- Google as a password cracker | Light Blue Touchpaper
- Le W3C publie une nouvelle norme d'authentification, qui permet de se connecter de manière sécurisée aux applications Web sans saisir de mots de passe
- authentication - Is a redirect showing the password in plain text a security vulnerability? - Information Security Stack Exchange
- What are the security risks of logging the hash of rejected passwords? - Information Security Stack Exchange
- Password-Guessing Was Used to Hack Gentoo Linux Github Account
- login bruteforcer
- Cracking password in Kali Linux using John the Ripper - blackMORE Ops
Malware_Development
Virology-Theory_and_Practice
- Is there a Linux virus? - Quora
- Security warning: Attackers are using these five hacking tools to target you | ZDNet
- New Malware Combines Ransomware, Coin Mining and Botnet Features in One
- Cryptovirology - use of cryptography in malware development - Wikipedia
- How to make a simple computer virus in Python - Coding Security
- virus vs worm - Google Search
- How to program a virus in c++ - Coding Security
- Ethical Hacking: Malware Threats | Pluralsight
- how to know if cracked program contains malicious code - Google Search
- eric filiol - Google Scholar
- Hooking - Wikipedia
- Zero-day (computing) - Wikipedia
- Exploit Development
- Exploit Building « Null Byte :: WonderHowTo
- exploit vs malware - Google Search
- How to Create a Metasploit Exploit in Few Minutes « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Build Your Own Exploits, Part 3 (Fuzzing with Spike to Find Overflows) « Null Byte :: WonderHowTo
- python vs ruby hacking - Google Search
- How to Use MinGW to Compile Windows Exploits on Kali Linux « Null Byte :: WonderHowTo
- Biohackers Encoded Malware in a Strand of DNA | WIRED
- Cisco's Talos Intelligence Group Blog: Vulnerability Walkthrough: 7zip CVE-2016-2334 HFS+ Code Execution Vulnerability
- New Malware Family Uses Custom UDP Protocol for C&C Communications
Sandboxing
- SandboxEscaper - Vulnerability Researcher: How to escape sandboxes without technical skills
Binary_Exploitation
Remote_Code_Execution
- Critical Flaw Found in Streaming Library Used by VLC and Other Media Players
Code_Injection
- .NET Process Injection | Tim MalcomVetter | LinkedIn
- sRDI - Shellcode Implementation Of Reflective DLL Injection - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to Use Command Injection to Pop a Reverse Shell on a Web Server « Null Byte :: WonderHowTo
- OWASP Testing Guide Appendix D: Encoded Injection - OWASP
Memory_Based_Attacks
Buffer_Overflow
- Advanced Exploitation: How to Find & Write a Buffer Overflow Exploit for a Network Service « Null Byte :: WonderHowTo
- Buffer overflow/overrun - Wikipedia
- Buffer-Overflow Vulnerability Lab
- Integer Undefined Behaviors in Open Source Crypto Libraries – integer overflow - Embedded in Academia
- Understanding_Integer_Overflow_in_C-Cpp.pdf
- Stack buffer overflow/overrun - stack smashing - protection schemes : stack canaries, nonexecutable stack, randomization ASLR - Famous malware examples taking advantage of stack buffer overflow - Wikipedia
- NOP-Slides buffer overflow exploits. at DuckDuckGo
- c - How to overflow a float? - Stack Overflow
- Buffer Overflow Exploits | Gaining Access to Target Systems Using Application and Operating System Attacks | InformIT
- The details of C function stack (and heap) operation when function call is made (caller) and returned (callee) on personal computers
- The buffer overflow hands-on tutorial using C programming language on Linux/Unix platforms and Intel microprocessor architecture with C code samples and tons of illustrations
- Teaching Stack Overflow
- Attack on Stack [Part 1]; Smash the Stack Visualization: Introduction to Memory, Registers and Assembly. « Null Byte :: WonderHowTo
- Buffer-Overflow Vulnerabilities and Attacks
- A hands-on tutorial on the stack-based buffer overflow problem, threats, vulnerability and exploit from the source to the consequences
- Integer overflow - vs saturation vs wrap around - buffer overflow security risk - Integer overflow exception handling in various programming languages - Wikipedia
- Saturation arithmetic - integer saturation/overflow in CPUs vs wrap-around in modular arithmetic - Wikipedia
- Aliasing (computing) - buffer overflows - aliasing analysers
- Stack overflow - recursion
- Heap overflow/overrun - Wikipedia
- Intel® Memory Protection Extensions Enabling Guide | Buffer Overflow protection - Denial Of Service
- interchanging signed/unsigned numbers can lead to security bugs - overwrite Program Counter PC/Instruction Pointer EIP/RIP on the stack - stack based buffer overflow
- stack pivot binary exploitation at DuckDuckGo
- Exploit Mitigation Techniques - Data Execution Prevention (DEP) - Linux - 0x00sec - The Home of the Hacker
- Exploit Mitigation Techniques - Stack Canaries - Exploit Development - 0x00sec - The Home of the Hacker
- Exploit Mitigation Techniques - Address Space Layout Randomization (ASLR) - Exploit Development - 0x00sec - The Home of the Hacker
- BOVSTT - Buffer Overflow Vulnerability Services Tester Tool - Hakin9 - IT Security Magazine
- C0:7E:01:8C:93:EB:D0:FD:E3:CD:74:32:9F:AF:FA:6F:40:FD:8E:1C:05:E3:79:41:6C:77:CD:EF:3E:04:11:12: Simplified Buffer Overflow Exploit Development (Part 1)
- The Web Application Security Consortium / Null Byte Injection
- CWE - CWE-242: Use of Inherently Dangerous Function (3.1)
- Unicode Security Guide
- Uncontrolled format string attack - Wikipedia
- Hacker Curriculum - ELF exploitation and infection
- Format String Vulnerabilities | Development & Security
- abatchy's blog | [Kernel Exploitation] 6: NULL pointer dereference
- Memory protection - segmentation, paged virtual memory, protection keys, simulated segmentation, dynamic tainting - capability based tainting
- Protection ring - hierarchical protection domains - vs capability-based security
- It’s Time to Get Serious About Exploiting Undefined Behavior – security - secure coding
- Intra-Process Memory Protection
for Applications on ARM and
x86: Leveraging the ELF ABI - security
- Protecting Private Keys against Memory Disclosure Attacks Using Hardware Transactional Memory - memory disclosure attack
- security - How does the kernel prevent a malicious program from reading all of physical RAM? MMU - signals, swap space
- More Software Vulnerabilities and Defenses - secure coding - Stack Smashing Attacks/Defenses - argument validation - Manual Memory/storage Management : dangling pointer, memory leak, garbage collection, static type system, dynamic code analysis, type safety, memory safety,
- Is divide-by-zero a security vulnerability? secure coding - Information Security Stack Exchange
- c - Memcpy() in secure programming? secure coding - microsoft alternatives - buffer overflow
- INT30-C. Ensure that unsigned integer operations do not wrap -
- DCL09-C. Declare functions that return errno with a return type of errno_t - C11 secure coding Annex K
- Signed vs. unsigned integers for lengths/counts - integer overflow, wrap, size_t, UINT_MAX
Building_Options_To_Preventing_Exploitation
- What is the most hardened set of options for GCC compiling C/C++? - Information Security Stack Exchange
- security compilation flags gcc at DuckDuckGo
- Useful GCC flags to improve security of your programs? - Stack Overflow
- security - How to test whether a Linux binary was compiled as position independent code? - Unix & Linux Stack Exchange
- Binary and Kernel Hardening - Debian Wiki
- Recommended compiler and linker flags for GCC - RHD Blog
- shared libraries - What does the -fPIC compilation flag does? - Stack Overflow
- Modern Binary Exploitation - RPISEC Spring 2015
- GitHub - Zer0Mem0ry/Detour: A simple project to demonstrate function hooking / detouring
- APIHook
- Function Hooking Part I: Hooking Shared Library Function Calls in Linux
- API Hooking with Microsoft Detours
- x86 API Hooking Demystified | Development & Security
- Improper input validation - Wikipedia
- Can you write a piece of code that is susceptible to be hacked and then demonstrate how a hacker would hack it? - Quora
- aslr memory mitigation at DuckDuckGo
Malware_Spreading_Methods
- Employee infects US govt network with malware after visiting 9,000 porn sites
- Malware Distributors Adopt DKIM to Bypass Mail Filters
- Fake Adobe Flash Installers Come With a Little Malware Bonus | WIRED
- Schneider Electric may have shipped USB drives infested with malware | ZDNet
- is it possible to get infected only by visiting a website at DuckDuckGo
- Google Search Results Exploited to Distribute Zeus Panda Banking Trojan
- Warning: CCleaner Hacked to Distribute Malware; Over 2.3 Million Users Infected
- Hackers Are Distributing Backdoored 'Cobian RAT' Hacking tool For Free
- Beware of Windows/MacOS/Linux Virus Spreading Through Facebook Messenger
- it's it possible that torrented movies hide malware at DuckDuckGo
- Hackers spread Android spyware through Facebook using Fake profiles
- Fake Chrome & Firefox browser update lead users to malware infection
- Inside the Unnerving CCleaner Supply Chain Attack | WIRED
- CCleaner Attack Timeline—Here's How Hackers Infected 2.3 Million PCs
- Cybercriminals Hijack Router DNS to Distribute Android Banking Trojan
- Thousands of hacked websites are infecting visitors with malware | Ars Technica
- How a USB could become security risk for your device
- Malicious Software Packages Found On Arch Linux User Repository
Office_Automation_Files_As_Attack_Vectors
- Unpatched MS Word Flaw Could Allow Hackers to Infect Your Computer
PDF_Files_Exploitation
- malware - Can a PDF file contain a virus? - Information Security Stack Exchange
- Two Critical Zero-Day Flaws Disclosed in Foxit PDF Reader
- Utiliser un PDF pour pirater votre boss comme un nul(l) | Pirater comme un nul(l)
- Bad-Pdf - Steal NTLM Hashes With A PDF From Windows Machines - KitPloit - PenTest Tools for your Security Arsenal ☣
- Office VBA + AMSI: Parting the veil on malicious macros - Microsoft Secure
- 'Father of Zeus' Kronos malware exploits Office bug to hijack your bank account | ZDNet
- New Microsoft Word attacks infect PCs sans macros | Ars Technica
- 17-Year-Old MS Office Flaw Lets Hackers Install Malware Without User Interaction
- MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware
- How Just Opening A Malicious PowerPoint File Could Compromise Your PC
- SophosLabs analysis: why the surge in Word docs hiding ransomware? – Naked Security
- Office DDE attack works in Outlook too – here’s what to do – Naked Security
- Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs
- MS Office Built-In Feature Could be Exploited to Create Self-Replicating Malware
- Microsoft Outlook issue fixed - BBC News
- MS Office’ Default Function Can Be Used to Create Self-Replicating Malware
- Attack by TIFF images: What are the vulnerabilities in LibTIFF?
- Ransomware hidden inside a Word document that’s hidden inside a PDF – Naked Security
- 18-Byte ImageMagick Hack Could Have Leaked Images From Yahoo Mail Server
- Microsoft Disables DDE Feature in Word to Prevent Further Malware Attacks
- Hackers Found Using A New Way to Bypass Microsoft Office 365 Safe Links
- Category:Attack - OWASP
- Exploit (computer security) - Wikipedia
- Metasploit Basics « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Find Exploits Using the Exploit Database in Kali « Null Byte :: WonderHowTo
- GitHub - NullArray/AutoSploit: Automated Mass Exploiter
- Exploiting System Shield AntiVirus Arbitrary Write Vulnerability using SeTakeOwnershipPrivilege | GreyHatHacker.NET
- Threat or menace? “Autosploit” tool sparks fears of empowered “script kiddies” | Ars Technica
- GitHub - micle-fm/Parat: Python based Remote Administration Tool(RAT)
- There is a shell in your lunch-box by Rotimi Akinyele - Hakin9 - IT Security Magazine
- Free Armitage Lesson
- How we breached your network | Tim MalcomVetter | Pulse | LinkedIn
- Attack Vector (malware) - Wikipedia
- Attack surface - reduction
Post-Exploitation
- SILENTTRINITY - A Post-Exploitation Agent Powered By Python, IronPython, C#/.NET - KitPloit - PenTest Tools for your Security Arsenal ☣
Privilege_Escalation
- Intel Confirmed Critical Escalation of Privilege Vulnerability — Now What? « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Pivot from the Victim System to Own Every Computer on the Network « Null Byte :: WonderHowTo
- hack how to turn a guest account into admin - Google Search
- reverse | maK_it: Linux Rootkit
- Ninja access to root privileges from userspace | maK_it: Linux Rootkit
- Windows Privilege Escalation Guide
- Linux Exploit Suggester - Linux Privilege Escalation Auditing Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
Maintaining_Access
Listeners_And_Backdoors
- GhostTunnel - A Covert Backdoor Transmission Method That Can Be Used In An Isolated Environment - KitPloit - PenTest Tools for your Security Arsenal ☣
- rootkit vs trojan - Google Search
- how to close remote backdoor on victim machine - Google Search
- rootkit vs rat vs listener vs backdoor at DuckDuckGo
- Listeners « Null Byte :: WonderHowTo
- rootkit vs rat vs listener vs backdoor - Google Search
- The Perfect Web Backdoor | pentestmonkey
- Hack Like a Pro: How to Embed a Backdoor Connection in an Innocent-Looking PDF « Null Byte :: WonderHowTo
- rootkit vs trojan - Google Search
- how to close remote backdoor on victim machine - Google Search
- Gazer: A New Backdoor Targets Ministries and Embassies Worldwide
- Hackers Exploit Recently Disclosed Microsoft Office Bug to Backdoor PCs
- Kaotic Creations: Backdooring Unix System via Cron - exploiting
- How to Upload a Shell to a Web Server and Get Root (RFI): Part 1 « Null Byte :: WonderHowTo
- Kaotic Creations: Backdooring Unix System via Cron
- Ransomware-spreading hackers sneak in through RDP – Naked Security
- Introduction to Trojans and Backdoors
- How to Create a Reverse Shell to Remotely Execute Root Commands Over Any Open Port Using NetCat or BASH « Null Byte :: WonderHowTo
- Reverse Shell Cheat Sheet
- penetration test - Reverse shell back door - Information Security Stack Exchange
- Shellcode - Reverse-Shell Wikipedia
- Maintaining Access Part 1: Introduction and Metasploit Example
Manipulating-Extracting_Data
- Answer - Quora
Keyloggers
- Part 2: Stealing keyboard keys for fun & profit | maK_it: Linux Rootkit
- Part 1: Stealing keyboard keys for fun & profit | maK_it: Linux Rootkit
- benefits of keyloggers | PC Booster Blog
- Hack Like a Pro: How to Remotely Install a Keylogger onto Your Girlfriend's Computer « Null Byte :: WonderHowTo
- How to create a keylogger that runs in background using python - Coding Security
- How to Use Kaspersky Virtual Keyboard Against Keylogger | IT Security Column
- What are some advantages of a virtual keyboard? What are some disadvantages? - Quora
- CrossRAT keylogging malware targets Linux, macOS & Windows PCs
- Keystroke logging - Wikipedia
- Don’t Fall for Webcam Blackmail: Here’s How to Protect Yourself
Ransomwares
- How to Use the USB Rubber Ducky to Disable Antivirus Software & Install Ransomware « Null Byte :: WonderHowTo
- GIBON Ransomware Being Distributued by Malspam
- Paradise Ransomware Uses RSA Encryption to Encrypt Your Files
- Decompiled SLocker Android Ransomware Source Code Published Online
- Warning: Two Dangerous Ransomware Are Back – Protect Your Computers
- New Fileless Ransomware with Code Injection Ability Detected in the Wild
- Russian Hacker Selling Cheap Ransomware-as-a-Service On Dark Web
- Hack Like a Pro: How to Secretly Hack Into, Switch On, & Watch Anyone's Webcam Remotely « Null Byte :: WonderHowTo
- What is Ransomware and How Do I Protect Against It?
- Hack Like a Pro: Creating a Virtually Undetectable Covert Channel with RECUB « Null Byte :: WonderHowTo
- Hacking Windows 10: How to Remotely Record & Listen to the Microphone of a Hacked Computer « Null Byte :: WonderHowTo
- Insecam - World biggest online cameras directory
Remote_Administration_Tools
- DarkComet - Wikipedia
- Dynamic DNS Update Client (DUC) for Windows - No-IP
- Ultimate Guide to Setup DarkComet with NoIP
- Setting up DarkComet - RAT 4 with NO - IP
- How To Setup DarkComet 5.2, No-IP, & Port Forward
- DarkComet RAT(Remote Administration Tool) Tutorial
- DarkComet RAT Beginner Tutorial W/Port Forwarding and No-Ip - YouTube
- DarkComet RAT Noob friendly tutorial ~ Indian Hacker's Colony
- Darkcomet Info | How to setup darkcomet
- Setup DarkComet-RAT with VPN | Darkcomet Info
- EmpireProject/Empire: Empire is a PowerShell and Python post-exploitation agent.
- Pupy - Opensource, Cross-Platform (Windows, Linux, OSX, Android) Remote Administration And Post-Exploitation Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- CertUtil.exe Could Allow Attackers To Download Malware While Bypassing AV
- Security hacker - Wikipedia
- Computer security - Wikipedia
- PTES Technical Guidelines - The Penetration Testing Execution Standard
- Penetration testing methodologies - OWASP definitive list - PTES, PCI, NIST 800-115 - ISSAF, OSSTMM, CREST
- MITRE ATT&CK™
- Vulnerability Assessment and Penetration Testing (VAPT) Services - Vulnerability Assessment & Penetration Testing (VAPT)
- hack-like-pro-hacker-methodology null byte
- Penetration Testing Framework 0.59
- The Attacker’s Process | The Technical Foundations of Hacking | Pearson IT Certification
- The Five Phases of Hacking « Null Byte :: WonderHowTo
- Hacking methodology | CCNA Security
- So...You Want to Be a Hacker? « Null Byte :: WonderHowTo
- Ethical Hacking Study Guide
- What is Hacking? Introduction & Types
- How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell - SecGen - Enumeration with Nmap - « Null Byte :: WonderHowTo
- [PentesterLab] Learn Web Penetration Testing: The Right Way
- Ethical Hacking: Understanding Ethical Hacking | Pluralsight
- Ethical Hacking: Penetration Testing | Pluralsight
- Hack Like a Pro: How to Hack Like the NSA (Using Quantum Insert) « Null Byte :: WonderHowTo
- The Ethical Hacking Framework
- GitHub - D4Vinci/One-Lin3r: Gives you one-liners that aids in penetration testing operations
- GitHub - NextronSystems/APTSimulator: A toolset to make a system look as if it was the victim of an APT attack
- GitHub - x3omdax/PenBox: PenBox - A Penetration Testing Framework - The Tool With All The Tools , The Hacker's Repo
- GitHub - ruped24/killchain: A unified console to perform the "kill chain" stages of attacks.
- Huntpad - The Bug Hunter's Notepad - KitPloit - PenTest Tools for your Security Arsenal ☣
- Pure Blood - A Penetration Testing Framework Created For Hackers / Pentester / Bug Hunter - KitPloit - PenTest Tools for your Security Arsenal ☣
- Website security - keep in check with Acunetix
- The Penetration Testing Execution Standard
Hackers_Jargon_And_Terminology
- The Motherboard e-Glossary of Cyber Terms and Hacking Lingo - Motherboard
- Jargon File Resources
- Types of Hackers: Beginner Level Part -2 - Develope IT
- Hacking guide for beginners Step by step
- Hacker Dictionary: Beginner Level Part - 5 - Develope IT
- Types of Hacking: Beginner Level Part -3 - Develope IT
- All the Terms Of Hacking World You Should Know
- How to Hack Wi-Fi: Getting Started with Terms & Technologies « Null Byte :: WonderHowTo
- Cyber-attack glossary: What are malware, patches and worms? - BBC News
- A DevSecOps Reference Guide 101 - Jargon - VA, PT, DAST, Parameterized DAST Scans, SAST, RASP, IAST, Fuzzing, Spidering, WAF, Webhook, Authentication, Authorization, Abuser Story, Tooling, Regression Testing, Exploit Scripts, Zero day, CVE, CVSS, CWE, CWSS, STRIDE, DREAD, OSSTMM, OSVD, OWASP ASVS, Vulnerability Management, Vulnerability Correlation
Skills-Learning_Curve
- How to Start a Career in Cybersecurity: All You Need to Know
- The Essential Skills to Becoming a Master Hacker « Null Byte :: WonderHowTo
- A Hackers Advice & Tip: Choosing Your Path. Knowing Where to Learn & How to Learn It **Newbies Please Read** « Null Byte :: WonderHowTo
- IT Skill Assessment
- Hacking for Newbies « Null Byte :: WonderHowTo
- How to Use Null Byte to Study to Become a Professional Hacker « Null Byte :: WonderHowTo
- How to become a professional hacker (Step by Step Guide) - Coding Security
- Problem Solving Is an Essential Hacker Skill « Null Byte :: WonderHowTo
- codingsec.net/2016/05/becoming-an-ethical-hacker/
- How to Become a Hacker « Null Byte :: WonderHowTo
Cheat_Sheets
- GitHub - rmusser01/Cheatsheets: Penetration Testing/Security Cheatsheets
- Penetration Testing Tools Cheat Sheet
- Most Important Penetration Testing Cheat Sheet Linux Machine
Legal_Stuffs
- The Legal Consequences of Hacking « Null Byte :: WonderHowTo
- Is Reversing Legal? - Reverse engineering for beginners - Develope IT
Comprehensive_Courses
RPISEC
- Home - RPISEC
- Index of /courses
- Security Group - RPISEC
- overview for rpisec
- Tweets by RPISEC (@RPISEC) – Twitter
Florida_State_University
2013
- Offensive Security Home Page (CIS 4930 / CIS 5930) Spring 2013
- Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
- Offensive Network Security: Home - academic course - Florida State University
- Training for manipulating all kinds of things: Learning Exploitation with Offensive Computer Security 2.0 - fsu redwood, academic course
UCR
- Schedule — CS 260 02, 2017 1 documentation
- Schedule - Academic course - Malware Analysis, fuzzing, vulnerbaility detection - program verification - sandbox/SFI - firewalls, intrusion detection, Network security, Password security - Web security, server/client side attack - OS access control MAC - Chrome Browser Security, chrome sandbox
eBooks-Notes
- Hacking, 2nd Edition The Art of Exploitation by Jon Erickson| No Starch Press
- Hacking The Art of Exploitation - HAOE- reflexions, practice - Shichao's Notes
- Introduction to Cybersecurity - Networking Academy
- Metasploit Unleashed - Free Online Ethical Hacking Course
- Index of /~cs342/fall08/handouts
Certifications-Majors
Majors
Florida_State_University
- MS in Computer Science | Computer Science
Certs
- Deal: Learn IT Security with This White Hat Hacker 2017 Bundle
- 7 Top Security Certifications You Should Have in 2017
- CISSP vs CEH? Which IT Security Certifications are More Valuable? - Hakin9 - IT Security Magazine
- 2018 CompTIA Security Certification Bundle: Your 57-Hour Track To Pass IT Certification Exams
- 5 Proven Cyber Security Certifications That Will Skyrocket Your Salary
- CEH Certification: Certified Ethical Hacking Certification
- InfoSec Resources - IT Security Training & Resources by InfoSec Institute
Offensive_Security
OSCP
- What are the best resources to study for the OSCP certification? - Updated
- What are the pre-requisites for OSCP certification exam? - Quora
- In the OSCP exam, how many machines do you have to root to pass the exam? - Quora
- In the world of information security, is the OSCP a good certification to have? - Quora
- Anyone out there on Quora who could share their experience taking OSCP exam? - Updated - Quora
- Is OSCP certificate enough to work as a pen test in United States? | Information Security
- Offensive Security Certified Professional (OSCP) Certification
- Penetration Testing with Kali - Online Security Training
- PWK Syllabus - penetration-testing-with-kali.pdf
- OSCP: hautement addictif
OSCE
- The Road to OSCE – David Valles – Medium
- Offensive Security's CTP and OSCE - My Experience - Security SiftSecurity Sift
- Path to OSCE - Course & Exam Review
- OSCE - Cracking the Perimeter Experience
- CTP/OSCE: LESSONS LEARNED | BYTESDARKLY
- OffSec Certs - Are They Still Worth the Money? OSCP, OSCE, OSEE and OSWE- definitive review and criticism - Hack.Learn.Share
- Offensive Security Certified Expert (OSCE) - vs OSCP comparison - Review
- Offensive security certs: OSCP and OSCE review – Pau Muñoz
- Any recommendation after OSCP other than OSCE? : oscp
- What is the difference between an Offensive Security Certified Expert (OSCE) and an Offensive Security Certified Professional (OSCP)? Are they the same? - Quora
- OSCE & CTP - The dreaded certification by Offensive Security - rootkit
- The search for animal 0-day: Reviews for OSCP, OSCE, OSEE and Corelan Advanced Training
- OSCE and Me - CTP course · OJ Reeves
- Offensive Security: OSCP & OSCE — TechExams Community
Hacking_Labs
Hardware_equipment-DIY
- How do USB killers work? - Quora
- hardware for hacking 2017 - Google Search
- Top 10 Best Laptop for Hacking in 2017 - For Hackers and IT Security Professionals - Sysprobs - Not Another Tech Blog
- Buying a professional penetration testing laptop for 2017
- Best Hacking Tools Of 2017 For Windows, Linux, And OS X
- Product Review: Best Hacking Laptops for 2017 - YouTube
- Minimum Requirements of a Laptop to Be Used for Hacking « Null Byte :: WonderHowTo
- Surprising tips from a super-hacker | Computerworld
- CIA Tools to Spy on Offline Computers with USB Drives Leaked - ExtremeTech
- USB Hacker Arsenal » DarknessGate.com
- How to Make an Auto Hacking Wardrive: 8 Steps
- How hackers use USB sticks - Business Insider
- Wickedly Clever USB Stick Installs a Backdoor on Locked PCs | WIRED
- Top 5 USB Hacks that PWN You
- best usb stick to install tails os - Google Search
- panasonic toughbook | Hackaday
- Panasonic rolls out new Toughbooks with Windows 7 and 16 hours of battery life | TechCrunch
- What Are the Best Laptops for Hacking? - Quora
- openwrt hacking - Google Search
- How to Set Up a Headless Raspberry Pi Hacking Platform Running Kali Linux « Null Byte :: WonderHowTo
- How to Build a Pumpkin Pi — The Rogue AP & MITM Framework That Fits in Your Pocket « Null Byte :: WonderHowTo
- PoisonTap: This $5 Device Hacks A Locked Computer In Seconds
- How to Select a Field-Tested Kali Linux Compatible Wireless Adapter « Null Byte :: WonderHowTo
- How to Build a Portable Pen-Testing Pi Box « Null Byte :: WonderHowTo
- Building Hacking Weapons With Raspberry Pi - Null Byte
- SWORD dropbox: A $15 OpenWRT based DIY disposable pen-test tool.
- How a Wi-Fi Pineapple Can Steal Your Data (And How to Protect Yourself From It) - Motherboard
- Six Great DIY Projects for Hacking Computers and Networks
- This USB Drive Will Self-Destruct After Ruining Your Computer | Hackaday
- How to Build a Portable Hacking Station with a Raspberry Pi and Kali Linux
- USB Stick with Heathrow Security and Queen' Data Found on London Street
- Buyer's Guide: Top 20 Hacker Holiday Gifts for Christmas 2017 « Null Byte :: WonderHowTo
- How to Hack Wi-Fi: Choosing a Wireless Adapter for Hacking « Null Byte :: WonderHowTo
- how to make use of an old laptop hacking - Google Search
- Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2017 « Null Byte :: WonderHowTo
- How to Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+ « Null Byte :: WonderHowTo
- Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2018 « Null Byte :: WonderHowTo
- How to Install Kali Live on a USB Drive (With Persistence, Optional) « Null Byte :: WonderHowTo
- How to Set Up Kali Linux on the New $10 Raspberry Pi Zero W « Null Byte :: WonderHowTo
- DIY Pi Zero Pentesting Tool Keeps it Cheap | Hackaday
- Battery Backup Conceals a Pentesting Pi | Hackaday
Security_Oriented_Platforms
Kali_Linux
Docs
- Kali Linux
- Kali Training
- Kali Tools
- Kali Docs
- Kali Forums
- NetHunter
- Offensive Security
- Exploit-DB
- GHDB
- MSFU
- Advanced Package Management in Kali Linux | Kali Linux
- Kali Linux Metapackages – Getting the missing tools properly. | GoAttack!
- Run 'Kali Linux' Natively On Windows 10 — Just Like That!
- Kali Linux Revealed | Mastering the Penetration Testing Distribution
BlackArch
- Exploring Kali Linux Alternatives: How to Get Started with BlackArch, a More Up-to-Date Pentesting Distro « Null Byte :: WonderHowTo
Pwn_Phones
- Mobile Hacking Part 1: Introduction and Device Building
- Mobile Hacking
- Android-based Pwn Phone is prepared to do evil for your network’s own good | Ars Technica
- Learn How to Do Android Hacking and Penetration Testing From Scratch
- 15 Best Free Hacking Apps For Android Phones (2017 Edition)
- Droidsniff - Stealing user's social credentials - Coding Security
- how does tpacketcapture work - Google Search
- HACK COMPUTER USING INTERCEPTER-NG (android) - Coding Security
- Tutorial-How to use zANTI2 for hacking - Coding Security
- 12 Best WiFi Hacking Apps For Android Smartphones | 2017 Edition
- 7 Best Android Hacking Apps on the Internet Ever in 2017
- Hijacker v1.4 - All-in-One Wi-Fi Cracking Tools for Android - KitPloit - PenTest Tools for your Security Arsenal ☣
- Exploring Kali Linux Alternatives: How to Get Started with Parrot Security OS, a Modern Pentesting Distro « Null Byte :: WonderHowTo
- Kali Linux on AWS
- Hack Like a Pro: Getting Started with Kali, Your New Hacking System « Null Byte :: WonderHowTo
- Mac for Hackers: How to Get Your Mac Ready for Hacking « Null Byte :: WonderHowTo
- BlackArch Linux Distro For Ethical Hacking Drops 32-bit Support
- Turn Any Phone into a Hacking Super Weapon with The Sonic « Null Byte :: WonderHowTo
- 40+ Free Best Tools that will help your become a powerful hacker - Coding Security
Vulnerable_Pen-testable_Targets
- OWASP Vulnerable Web Applications Directory Project - OWASP
- www.amanhardikar.com/mindmaps/PracticeUrls.html
- Practice.png (3780×4199)
- Vulnerable By Design ~ VulnHub
- How to Use SecGen to Generate a Random Vulnerable Machine - Vagrant, Nmap « Null Byte :: WonderHowTo
- GitHub - rapid7/hackazon: A modern vulnerable web app
- Hackazon
- Hack This Site!
- GitHub - ethicalhack3r/DVWA: Damn Vulnerable Web Application (DVWA)
- Create your ethical hacking environment: install DVWA into your Kali Linux
- GitHub - WebGoat/WebGoat: WebGoat 8.0
- Test Site
- GitHub - bkimminich/juice-shop: OWASP Juice Shop is an intentionally insecure webapp for security trainings written entirely in Javascript which encompasses the entire OWASP Top Ten and other severe security flaws.
- DVIA (Damn Vulnerable iOS App) - A vulnerable iOS app for pentesting
- DVAR - Damn Vulnerable ARM Router | The Exploit Laboratory
- Exploit Development: How to Learn Binary Exploitation with Protostar « Null Byte :: WonderHowTo
- OWASP iGoat (Swift) - A Damn Vulnerable Swift Application For iOS - KitPloit - PenTest Tools for your Security Arsenal ☣
- PwnAdventure3 - Game Open-World MMORPG Intentionally Vulnerable To Hacks - KitPloit - PenTest Tools for your Security Arsenal ☣
- OWASP Juice Shop - An Intentionally Insecure Webapp For Security Trainings Written Entirely In Javascript - KitPloit - PenTest Tools for your Security Arsenal ☣
- Noobz Guide for Setting Up a Vulnerable Lab for Pentesting
- Kurukshetra - A Framework For Teaching Secure Coding By Means Of Interactive Problem Solving - KitPloit - PenTest Tools for your Security Arsenal - vulnerable pentestable targets
Cloud_Hosted_Labs
- Virtual Penetration Testing Labs - Offensive Security
- Hack The Box :: Penetration Testing Labs
- How to setup and run a penetration testing (pentest) lab on AWS or Google Cloud with Kali Linux, Metasploitable and WebGoat | Ravello Blog
- How to setup and run a pentest lab on AWS – ls /blog
- Penetration Testing - Amazon Web Services (AWS)
- Penetration Testing in the AWS Cloud: What You Need to Know - Rhino Security Labs
- Creating a Simple Free Malware Analysis Environment | MalwareTech
- Hack Like a Pro: How to Create a Virtual Hacking Lab « Null Byte :: WonderHowTo
- how to make use of old pc within hacking lab - Google Search
- Set up your own malware analysis lab with VirtualBox, INetSim and Burp - Christophe Tafani-Dereeper
- Metta - An Information Security Preparedness Tool To Do Adversarial Simulation - KitPloit - PenTest Tools for your Security Arsenal ☣
- RedHunt OS - Virtual Machine For Adversary Emulation And Threat Hunting - KitPloit - PenTest Tools for your Security Arsenal ☣
- SEED Project - Hacking Labs
- Run SEED VM on VirtualBox - SEEDVM_VirtualBoxManual - Definitive Guide on Configuring Hacking Lab on VirtualBox - VM Networking, VM Clone/Cloning, VM Folder Sharing Configuration - host only vs nat network
Forbidden_Targets
- 403 Forbidden - Targets to Hack
Privacy_and_Anonymity
Privacy
Cyber_Threat_Modelling
- What Is Threat Modeling? - Motherboard
- Threat model | Surveillance Self-Defense
- Security training: Targeted Activists versus The State · AnarchoTechNYC/meta Wiki · GitHub
State_Surveillance
- Surveillance Kills Freedom By Killing Experimentation | WIRED
- Swedish court tells ISP to block The Pirate Bay in the country
- Edward Snowden on Protecting Activists Against Surveillance | WIRED
- Why Big Tech and the Government Need to Work Together | WIRED
- Tech industry told ‘privacy is not absolute’ and end-to-end encryption ‘should be rare’ | 9to5Google
- DOJ: Strong encryption that we don’t have access to is “unreasonable” – Ars Technica
- The Motherboard Guide to Avoiding State Surveillance - Motherboard
- Australia announces plan to ban working cryptography at home and in the US, UK, New Zealand, and Canada / Boing Boing
- Congress Just Voted to Let Internet Providers Sell Your Web History
- How the Government Hides Secret Surveillance Programs | WIRED
- Surveillance system or public-safety tool? Seattle dismantles controversial wireless mesh network | The Seattle Times
- The Apple-FBI Fight Isn't About Privacy vs. Security. Don't Be Misled | WIRED
- Does the NSA have a backdoor to Linux? - Quora
- ‘Significant’ FBI Error Reignites Data Encryption Debate | WIRED
- FBI admits over-counting locked iPhones and other mobiles - BBC News
- 2 years after FBI vs. Apple, encryption debate remains - Axios
- How the US Government Planted 'Spy Phones' on Suspects | WIRED
- Reflections on Trusting Trust - open source code liability to backdoor planting - is linux backdoored -security
- Prevention measures against laptop seizure at US borders - data privacy at borders
- EFF's Guide to Protecting Electronic Devices and Data at the U.S. Border | privacy
- apt - What are prudent security precautions to take for business travel by people with access to sensitive info? privacy at borders
Overall_Privacy_Encryption_Measures
- 5 Privacy Mistakes that Leave You Vulnerable Online - definitive - Cyber Crime, DDOS, Malware, Privacy, security, Technology, VPN
- Social Hacking and Protecting Yourself from Prying Eyes « Invisible Computer :: WonderHowTo
- You need to encrypt all your data. This is how it’s done
- This is how you encrypt your entire life | TechTalks
- Encrypt Everything - Ultimate Encryption Guide - Be Encrypted
- How to Encrypt All of the Things, From Chats to Calls and More | WIRED
- Real people don't (just) need encryption / Boing Boing
- Physical Measures to Amp Up Your Digital Security - wired
- The Encryption Debate Should End Right Now, After Vault 7, Shadow Brokers, WannaCry, and Petya | WIRED
- How to Protect Your Personal Data in 3 Simple Ways
- To Protect Genetic Privacy, Encrypt Your DNA | WIRED
- What To Do If You've Been Doxed | WIRED
- A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The Guardian
- Encryption Becoming 'Public Safety Issue' - FBI | News | Cointelegraph
- Why Care About Privacy?
- 9 Tips For Internet Privacy [Infographic] - Defintive Visual Guide - privacy respectuous alternatives
Industrial_Privacy_Violations_Tracking
- next gen captcha privacy at DuckDuckGo
- Apple Removes Several Trend Micro Apps For Collecting MacOS Users' Data
- Google Secretly Tracks What You Buy Offline Using Mastercard Data
- Google and MasterCard will track your retail spending under a secret deal
GDPR
- GDPR 'risks making it harder to catch hackers' - BBC News
- Why hackers will use GDPR to their advantage by TSG - Hakin9 - IT Security Magazine
- Will Europe's Looming Tech Rules Prove to Be a Template for the World?
- GDPR and the REAL impact on business
- Ransomhack; a new attack blackmailing business owners using GDPR
- 13 things to know about the GDPR, Mozilla and Firefox
- GDPR quiz: How will data privacy law affect you? - BBC News
- Does the GDPR Threaten the Development of Blockchain?
- What Amazon Echo and Google Home Do With Your Voice Data—And How to Delete It | WIRED
- Ethics refactoring · AnarchoTechNYC/meta Wiki
- Android phones 'betray' user location to Google - BBC News
- More than 480 web firms record 'every keystroke' - BBC News
- Skype faces fine after refusing to allow eavesdropping – Naked Security
- Germany bans children's smartwatches - BBC News
- As DOJ calls for “responsible encryption,” expert asks “responsible to whom?” – Ars Technica
- How Facebook's tentacles reach further than you think - BBC News
- how to make sure a conversation is not listened on mobile - Google Search
- Google Home Mini secret-recording fiasco is a black eye for Google at the worst possible time - Business Insider
- Uber removing private iOS API that allowed them to record your display | 9to5Mac
- AccuWeather app shared users' location data - BBC News
- Alexa, Are You Spying On Me? Not Really, Maybe, It's Complex!
- Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users
- Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests
- HP Silently Installs Telemetry Bloatware On Your PC—Here's How to Remove It
- Facebook’s ex-president: we exploited “vulnerability in human psychology” – Naked Security
- Google faces mass legal action in UK over data snooping - BBC News
- Massive Breach Exposes Keyboard App that Collects Personal Data On Its 31 Million Users
- This Fidget spinner app is sending other apps data to Chinese server
- How To Check And Remove HP Keylogger From Your Laptop?
- Leftover Debugger Doubles as a Keylogger on Hundreds of HP Laptop Models | Threatpost | The first stop for security news
- HP laptops found to have hidden keylogger - BBC News
- GPS is off so you can’t be tracked, right? Wrong – Naked Security
- hackread.com/android-gaming-apps-tracking-tv-viewing-habits/
- Facebook Accepts That Sometimes It Can Be A Threat To Democracy
- How to Detect and Disable Email Tracking
- Facebook wants you to install a VPN app accused of spying on users
- ISPs Caught Injecting Cryptocurrency Miners and Spyware In Some Countries
- All You Need to Know About the Cambridge Analytica Privacy Scandal
- Amazon explique pourquoi son enceinte connectée Echo a enregistré une conversation, puis l'a envoyée à un contact
- Facebook Accused of Giving Over 60 Device-Makers Deep Access to User Data
- Google Collects Android Location Data Even When Location Service Is Disabled
- Are Your Smartphones' Batteries Spying on You?
- Amazon Alexa Has Got Some Serious Skills—Spying On Users!
- Apple jams Facebook's web-tracking tools - BBC News
- ethics - How to be diplomatic in refusing to write code that breaches the privacy of our users - The Workplace Stack Exchange
Hardware-Infrastructure_Privacy
- GitHub - thearkadia/The_Ark: The Ark - ¿Democracy's Favorite Device?
Private_Celluar_Coms
- Sopranica: Text And Call Using This Open Source Cellular Network For Complete Anonymity
- Now use Internet anonymously through Tor-enabled SIM card Onion3G
- ZeroPhone Is "Coming Soon": A Raspberry Pi-Based, Linux-Powered Phone For Just $50
- This Interview Was Conducted on an Anonymous, DIY Cell Phone Network - Motherboard
- This Software Developer Is Making a Surveillance-Free Cell Phone Network - Motherboard
- does microwave block cell phone at DuckDuckGo
- putting cell phone in microwave for privacy at DuckDuckGo
- Can Android phone running without SIM card be tracked (localized) by police? IMEI, GSM, Access Point - Phone/Cellular tracking
- How To Find IMEI Number Of Your Phone (Even If It's Lost) - Phone/Cellular Tracking
- Editor’s Corner—Private wireless networks are quietly becoming a thing | FierceWireless
Secure_EndPoints-Stored_Data-Storage_Devices
Security_Privacy-focused_Operating_Systems
Tails_OS
- how secure is tails os - Google Search
- The security flaws in Tails Linux are not its only problem | Computerworld
- The ultra-secure Tails OS beloved by Edward Snowden gets a major upgrade | PCWorld
- https://lifehacker.com/5916551/browse-like-bond-use-any-computer-without-leaving-a-trace-with-tails
- Linux Security Distros Compared: Tails vs. Kali vs. Qubes
Qubes_OS
- Qubes OS | My Experience So Far
Hardened_Linux_From_Scratch
- Hardened Linux From Scratch - privacy respectuous operating system alternative
- Download HLFS
- Has anyone built a hardened, musl-based LFS system? Are there any good resources? [X-post /r/linuxfromscratch] : linuxquestions
Mobile_Privacy
- Mobile Websites Can Tap Into Your Phone's Sensors Without Asking | WIRED
- how secure keyboard apps are in Android at DuckDuckGo
- Powerful Android and iOS Spyware Found Deployed in 45 Countries
- keyboard mobile apps comparison at DuckDuckGo
- Location History allows Google (GOOG) to track every move you make with an Android phone — Quartz
- Android’s full-disk encryption just got much weaker—here’s why | Ars Technica
- Why all Android phones (even Samsung's) should run stock Android | PCWorld
- Hackers Used Malicious MDM Solution to Spy On 'Highly Targeted' iPhone Users
- does huawei spy on its smartphone users at DuckDuckGo
- android rooting and privacy at DuckDuckGo
- Mobile Phones privacy
- How to Encrypt your Phone? (Guide to Encrypted Phone) | Beencrypted
- Liberate Your Device - Free Your Android! privacy respectuous Android Distribution - F-Droid - LineageOS/CyanogenMod - FSFE
- LineageOS – LineageOS privacy respectuous Android Distribution
- microG Project - privacy respectuous Google's Android user space apps and libraries
- How can you use Android, but not be tracked by Google - privacy respectuous alternatives/measures - F-Droid, Firefox, Tor, VPN - LineageOS based on the old CyanogenOS -
- Improve your Android device privacy level with our easy to follow guide - Device Encryption, lockscreen, find my device feature, password strength, VPN, encrypted
- Mission Impossible: Hardening Android for Security and Privacy - definitive smartphone/mobile security, privacy - hardware, carrier baseband firmware | Tor Blog
- 2016 update - Mission Impossible: Hardening Android for Security and Privacy - definitive smartphone/mobile security, privacy - hardware, carrier baseband firmware | Tor Blog
- How to encrypt your iPhone, Android phone, or Windows Phone - FDE Full Disk Encryption
Disk_Encryption
Filesystem_Encryption
- How to encrypt and decrypt a folder on Android with SSE Universal Encryption | FNR Solutions, Inc. | LinkedIn
- encryption - How secure is an encrypted LUKS filesystem? - Ask Ubuntu
- luksipc Documentation — luksipc 0.04 documentation
- Filesystem-level encryption - Wikipedia
- List of cryptographic file systems - filesystems with support for filesystem-level encryption - Wikipedia
- How To Encrypt Your Hard Drive - Best Guide - Be Encrypted
Full_Disk_Encryption
Hardware_Encryption
- Microsoft issues a security advisory regarding a vulnerability in hardware encryption - MSPoweruser
FDE_on_Android
- android 7 full disk encryption at DuckDuckGo
- Millions of Android devices have flawed full disk encryption
- How to Crack Android Full Disk Encryption on Qualcomm Devices
- Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
- Google Android on Qualcomm Full Disk Encryption weak encryption
- Android Flaw Allows Full-Disk Crypto Bypass - BankInfoSecurity
- android full disk encryption site:security.stackexchange.com - Google Search
- Are there actually any advantages to Android full-disk encryption? - Information Security Stack Exchange
- Full-Disk Encryption | Android Open Source Project
- Do android phones have hardware chips for encryption? If it's software only, then what is the performance/battery impact? - Android Enthusiasts Stack Exchange
- How can Android encryption be so fast? Definitive explanation of FDE encryption/decryption process- Information Security Stack Exchange
- How have ARM TrustZone flaws affected Android encryption? Android's FDE implementation - vs Apple iPhones, firmware
- Full-Disk Encryption FDE Works - Schneier on Security
- New Cold Boot Attack Unlocks Disk Encryption On Nearly All Modern PCs
- F-Secure Press Room | Global
- full disk encryption huawei honor 8 - Google Search
- A Decade-Old Attack Can Break the Encryption of Most PCs | WIRED
- Security flaw in ‘nearly all’ modern PCs and Macs exposes encrypted data – TechCrunch
- full disk encryprion huwaei honor 8 at DuckDuckGo
- Tales from the Crypt: Hardware vs Software - Infosecurity Magazine
- https://online.tugraz.at/tug_online/voe_main2.getvolltext?pCurrPk=59565
- Trusted Platform Module (TPM) Summary | Trusted Computing Group
- Hardware vs Software-Based Encryption | Kingston
- TPM and HSM Hardware Encryption Devices | Get Certified Get Ahead
- Is it better to use Bitlocker or the built-in-drive-encryption that my SSD offers? - Super User
- How to Use the TPM: A Guide to Hardware-Based Endpoint Security | Trusted Computing Group
- What are the differences between TPM and HSM? - Information Security Stack Exchange
- Bitlocker: hardware or software encryption without a TPM? - Super User
- Types of attacks for volume encryption keys (Windows 10) | Microsoft Docs
- TPM vs. EFS
- Does Windows protect MBR from being overwritten? - Information Security Stack Exchange
- https://www.trustedcomputinggroup.org/wp-content/uploads/SANS-Implementing-Hardware-Roots-of-Trust.pdf
- http://www.cs.tau.ac.il/~tromer/istvr1516-files/lecture10-trusted-platform-sgx.pdf
- Bootkit bypasses hard disk encryption - The H Security: News and Features
- http://courses.cs.vt.edu/~cs5204/fall10-kafura-BB/Papers/TPM/Intro-TPM-slides.pdf
- What is Full-Disk Encryption (FDE)? | TechTalks
- How to Encrypt Your Home Folder After Installing Ubuntu
- How to get quality-encryption on Debian disk after installation? - Unix & Linux Stack Exchange
- Look before you leap into Disk Encryption
- Comparison of disk encryption software - Wikipedia
- Reminder: macOS still leaks secrets stored on encrypted drives | Ars Technica
- Full Disk encryption FDE - vs. filesystem-level encryption - TPMs introduces single point of failure in the encryption - Wikipedia
- security - How does FDE (Full Disk Encryption) work so quickly? - definitive - performance - SSD vs HDD
- What is full-disk encryption (FDE)? - Definition from WhatIs.com
- full disk encryption android - Google Search
- full disk encryption ios - Google Search
- how hard disk encryption works - Google Search
- how to encrypt hard drive kali linux - Google Search
- Uncrackable: Secure Your Secrets with 4096-Bit Encryption « Null Byte :: WonderHowTo
- Bruteforcing Linux Full Disk Encryption (LUKS) with hashcat - The Forensic way!
- system installation - What are the advantages/disadvantages of the new encryption feature in ubuntu 13.10 - Ask Ubuntu
- Cold boot attack - side channel, memory disclosure attack - secure boot UEFI, memory dump - secure data erasure/deletion - Full Memory Encryption RAM - Full Disk Encryption
- Attackers Can Use Sonic and Ultrasonic Signals to Crash Hard Drives
- Linux Unified Key Setup - Wikipedia
- Emergency self-destruction of LUKS in Kali | Kali Linux
- Locking Down Data - Full Disk Encryption vs. File Encryption - Data Security Blog | Thales e-Security
- Full disk encryption | Surveillance Self-Defense
- How to: Encrypt Your iPhone | Surveillance Self-Defense
- How to: Encrypt Your Windows Device | Surveillance Self-Defense
- Linux File Encryption Using GPG - Gnu Privacy Guide - PGP
- Comparison of encrypted external drives - Hardware-based FDE Full Disk Encryption - Wikipedia
- Data remanence - secure deletion - Wikipedia
- Hard Drive Passwords Easily Defeated; the Truth about Data Protection - definitive comparison - EFI/BIOS Password vs OS Operating System Password vs HDD Hard Drive ATA Password vs Software-Based FDE Full Disk Encryption vs Next-Generation Hardware-based Encryption
- How secure is hardware Full disk encryption (FDE) for SSD's - definitive explanation for the weaknesses of SED/Hardware based FED -
- Self-encrypting drive / hardware based FDE VS full disk encryption VS volume/filesystem level encryption
- Self-Encrypting Disks pose Self-Decrypting Risks
- definitive paper on How to break Hardware-based Full Disk Encryption - attacks, cold boot attack, evil maid attacks
- Hardware full disk encryption technology for military applications using two-layer commercial solutions - SSD, HDD - Military Embedded Systems
- Think your SSD offers rock-solid hardware-based full disk encryption? Here’s why it’s time to think again… SED, Bitlocker, Veracrypt
- I want the TRUTH about SSDs and FDE (Full Disk Encryption) / SED (Self-Encrypting Drive - ATA/PATA Password - Ars Technica OpenForum
- DEFINITIVE - Self-Encrypting Drives - Hardware based FDE for HDD and SSD - definitive technical breakdown - Firmware compromise, Key management NVRAM in-memory key attack, constant power attack, pre-boot authentication - TCG OPAL 2.0 - secure disk erasure/ sanitization - disadvantages vs software full based encryption FDE, LUKS dm-crypt - Constant-power exploits, Key-in-memory exploits, Compromised firmware - sedutil, Drive Trust Alliance (DTA)
- Full Disk Encryption vs Storage/ filesystem Encryption - Information Security Stack Exchange
- Hardware based FDE vs Bitlocker - Information Security Stack Exchange
- Is suspend-to-ram really a meaningful risk for Full Disk Encryption? key management - Information Security Stack Exchange
- Hardware based full encryption for flash drives - Information Security Stack Exchange
- How to tell if my laptop is protected by FDE? - Super User
- Are Macs vulnerable to the recent SSD SED/hardware based encryption vulnerability? - Ask Different
- How does full memory encryption in newer processes protect against DMA attacks? definitive answer - cold boot attack - TME/SME, TPM - Information Security Stack Exchange
- Is it possible to prevent a physical attack on full disk encryption FDE? - Information Security Stack Exchange
- SSD full disk encryption vs Veracrypt - vulnerabilties, weaknesses, SSD-awareness FDE - truecrypt - copy from RAM
- DEFINITIVE - Is it possible to tell if hard drive is encrypted? definitive recognition/detection/identification techhniques - digital forensics, signatures - file based ecnryption vs FDE - file randomness , /dev/urandom, probability distribution, randomness- bitlocker, diskcryptor/truecrypt/veracrypt, filevault, cryptsetup/LUKS, checkpoint full disk encryption FDE, GuardianEdge Encryption Plus/Anywhere/Hard Disk Encryption and Symantec Endpoint Encryption, McAfee Safeboot/Endpoint Encryption, Sophos Safeguard Enterprise and Safeguard Easy, Symantec PGP Whole disk Encryption
- Breaking full-disk encryption on a computer that's rarely used - Information Security Stack Exchange
- How secure is Intel SSD Encryption? ATA passwords, full disk encryption- Information Security Stack Exchange
- Are there any hardware-based full disk encryption FDE solutions for my notebook? truecrypt, Intel chip for AES - Information Security Stack Exchange
- Laptops SSD: Hardware based FDE plus FDE DM-Crypt/Luks - double layer FDE - Security and Performance - Information Security Stack Exchange
- How do I verify that my FDE/SED Opal SSD is indeed encrypted - SED Hardware based FDE encryption verification/confirmation
- Erasing a hard-disk, encrypting it as alternative? data erasure, cryptoshredding - Information Security Stack Exchange
- If /system partition is never encrypted (even in "full-disk" encryption), how is it protected? weakness - Android Enthusiasts Stack Exchange
- Isn't file encryption good enough? Volume/Storage/Filesystem-level encryption VS FDE Full disk encryption - Information Security Stack Exchange
- Full Disk Encryption vs File-Based/filesystem-level Encryption - The Security Buddy
- Which type of disk encryption protects the MBR (master boot record) file of the system? full disk encryption - Skillset
- Full Disk Encryption with VeraCrypt – Andrew Douma – Medium
- Mitigating the LUKS decryption key residing in RAM for FDE - Information Security Stack Exchange
- When using LUKS, which parts of the hard disk are not encrypted? dm-crypt - Information Security Stack Exchange
- Securing the bootloader - UEFI Secure boot - Information Security Stack Exchange
- Multi-boot with full hard drive encryption FDE and pre-boot authentication - Information Security Stack Exchange
- Boot Sequence -MBR - Power-On Self-Test POST - OSDev Wiki
- Crypto-shredding & backups of keys - Information Security Stack Exchange
- Crypto shredding: How it can solve modern data retention challenges - data erasure/deletion - GDPR
- Cryptographic Erasure/ Crypto-shredding Moving Beyond Hard Drive ...
- Cryptography and Computer Security: The life cycle of Passwords & Keys Life cycle and their relationship with your protection - crypto-shredding, secure data erasure/deletion - key/password management/secure storage
- UT Arlington Computing Device Full Disk Encryption FDE Requirements - compliance example
- Full Disk Encryption Buyer's Definitive Guide - vs file-based/filesystem encryption - key management and recovery - security shortfalls/risks/weaknesses - Bitlocker, AES-NI - In-memory Attacks
- Key Management and Full Disk Encryption (FDE) - Pre-boot authentication - central storage and distribution of key - Bitlocker
- Full Disk Encryption - TPM, Bitlocker, Filevault
- Researchers Break Full-Disk Encryption of Popular SSDs | SecurityWeek.Com
- How the Drive Security feature works - Hardware based FDE/SED - FIPS recommendations
- Full Disk Encryption - an overview - Payment Card Industry - Bootkit/Rootkit - MBR - Cold/Stoned Boot Attack - DMA -RAM Dump - FDE Weaknesses - Forensics on FDE -
- You & Your Data, Part 1: Full Disk Encryption – Bitlocker, Filevault, Veracrypt - Dock – Medium
- Full Disk Encryption with Multi-Factor Authentication - pre-boot authentication environment- yubikey
- Self-encrypting deception: weaknesses in theencryption of solid state drives SSD - definitive white paper -
- SSD SED vulnerabilities - Opal specs flawed implementation - Bitlocker
- FDE, Full disk encryption - ManualFullSystemEncryption - LUKS - LVM - secure/encrypted Boot - manual partitioning and optionally any of these features: dual-booting (e.g. with Windows) - encrypted hibernation - hybrid suspend - multi-disk installation - Community Help Wiki
- Encrypting Your Laptop Like You Mean It - definitive real life scenario around Full Disk Encryption - Cold boot attack demonstration
- How do I buy a laptop with an encrypted hard drive? | Technology | The Guardian
- system installation - How can I install Ubuntu encrypted with LUKS with dual-boot? Full Disk Encryption FDE - definitive guide on dual-boot FDE - - Ask Ubuntu
- Full Disk Encryption VS Home Folder/Filsystem encryption - why should the former be chosen over the latter
- Is hardware based full disk encryption more secure that software based? FDEs - definitive comparison - Information Security Stack Exchange
- encryption - Encrypted flash drives - SEDs - fde
- Advice on buying an encrypted disk - Choosing SED self encrypted drive
- What does hardware full disk encryption imply? - LUKS
- Hardware-based full disk encryption FDE - Self-Encrypting Drive SED - cryptoshredding - Wikipedia
- Disk encryption software - Full Disk Encryption FDE - Cryptoshredding - plausible deniability
- Got HW Crypto ? On the (in)security of a Self-Encrypting Drive series - SED hardware based full disk encryption FDE vulnerabilities
- 256-bit AES encryption broken in SandForce SSD controllers - government surveillance - backdoors - SEDs hardware based FDE
- Breaking Full Disk Encryption FDE from a Memory Dump - Appsecco
- Breaking Hard-Disk Encryption - FDE - ElcomSoft Forensic Disk Decryptor can decrypt BitLocker, PGP, and TrueCrypt - definitive Clive Robinson's insights on FDE/hardware based FDE , TPM, DMA Direct Memory Access, MMU, PKI
- filesystem encryption vs full disk encryption at DuckDuckGo
VM_Encryption
- How to encrypt VirtualBox VMs - TechRepublic
- Enabling Virtual Machine Encryption (VM Encrypt) | OVH Guides
- virtual machine - Is there any reason to encrypt a VM? (already have file vault encryption for Mac enabled) - Stack Overflow
- Virtual Machine Encryption Best Practices
- VMware Workstation Documentation Center
- virtualization - Full Disk Encryption within a VM, how secure is it? - Information Security Stack Exchange
- encryption - Are there any benefits if you encrypt the home folder in a VM? - Information Security Stack Exchange
- encryption - Completely encrypting virtual machine (for free) - Information Security Stack Exchange
- veracrypt at DuckDuckGo
Disk_Data_Destruction
- How to Safely and Securely Dispose of Your Old Gadgets | WIRED
- How to Permanently Delete Files to Protect Privacy and Passwords - secure deletion « Null Byte :: WonderHowTo
- Answer - Quora
- how to make a storage disk completely unreadable - Google Search
- does putting drive in microwave effectively destroy all data at DuckDuckGo
- privacy tips before giving away a mac os x at DuckDuckGo
- How to Delete files securely in Mac OS X Leopard « Operating Systems :: WonderHowTo
- What Should I Do to My Work Laptop Before I secure deletion - Leave My Job?
- How to: Delete Your Data Securely on Mac OS X | Surveillance Self-Defense
- How to: Delete Your Data Securely on Windows | Surveillance Self-Defense
- Can Intelligence Agencies Read Overwritten Data? Secure data deletion
- Secure deletion: a single overwrite will do it - The H: Open Source, Security and Development
- Securely deleting files from ext4 filesystems [LWN.net] - secure deletion
- security - How to securely delete data after rm - secure deletion - Unix & Linux Stack Exchange
- How to Clean a Computer Before Leaving a Job | secure deletion - Techwalla.com
- privacy - I'm leaving my job and want to erase as many personal details etc. as possible; any tips? secure deletion in workplace, privacy - Information Security Stack Exchange
- End-to-end encryption isn't enough security for 'real people'
- World Cup 2018: How to Secure Your Devices When Traveling in Russia | WIRED
- Wear leveling | Surveillance Self-Defense
- Keeping Your Data Safe | Surveillance Self-Defense
Secure_End_to_End_Communications
Browsing_Tools_Privacy
- Paid Attention
Browser_Privacy
Browsers_Comparison_Over_Privacy
- chromium vs firefox privacy - Google Search
- Firefox installs add-ons into your browser without consent… again
- chromium vs firefox quantum privacy - Google Search
- A Lighter-weight Firefox
- Best Secure Browsers that Protect Your Privacy - definitive breakdown - Firefox privacy concerns - Ungoogled chromium - browser compartmentalization - Secure browser add-ons list | Restore Privacy
- Tor vs. PirateBrowser vs. Anonymox: Privacy and Access Compared
Privacy_Enhancing_Extensions
- The Firefox NoScript guide you have all been waiting for - gHacks Tech News
- The Best Browser Extensions that Protect Your Privacy
- https everywhere worth it - Google Search
- tls - Is using "HTTPS everywhere" extension secure? - Information Security Stack Exchange
- HTTPS Everywhere - Wikipedia
- HTTPS everywhere sucks! « Dvorak News Blog
- engadget.com/2018/02/24/mit-veil-private-browsing/
- 5 things to note about HTTPS Everywhere | ZDNet
- Firefox Monitor tool informs users if they have been hacked
- Firefox will soon flag sites that have been hacked
- 5 Firefox extensions to protect your privacy | Opensource.com
Fingerprinting
- canvas based browser fingerprinting - Google Search
- A gargantuan all-seeing eye is watching you on popular websites – Naked Security
- What is Device Fingerprinting?
- fingerprint - Why do browsers send such detailed user agent strings? - Information Security Stack Exchange
- using chrome behind a vpn is there fingerprinting risk at DuckDuckGo
- BrowserLeaks.com - Assessment Tool - Web Browser Security Checklist for Identity Theft Protection - IP, Geolocation API, Flash Player, WebGL, Canvas Fingerprinting, JavaScript, Silverlight, java Applet, Content Filters, Features Detection
- Device Info - security test - Fingerprint Assessment Tool, Technology Detection
- Browser Security Audit - Assessment Tool - Check for Same-origin Policy, Content Security Policy, Corss-Origin Resource Sharing, Cookies, Request Headers, Response Headers
- Screen Information - Browser fingerprinting assessment tool - BrowserSpy.dk
- privacy - How can you be tracked using screen resolution/monitor size in Tor? - Information Security Stack Exchange
- Browser Fingerprinting: Explanation & Solutions (2019) - definitive guide | Restore Privacy
AdBlocking_Technologies
- Adblocker-blockers get around sites that block adblockers
- How WIRED Is Going to Handle Ad Blocking | WIRED
- GitHub - reek/anti-adblock-killer: Anti-Adblock Killer helps you keep your Ad-Blocker active, when you visit a website and it asks you to disable.
- hBlock - Improve Your Security And Privacy By Blocking Ads, Tracking And Malware Domains - KitPloit - PenTest Tools for your Security Arsenal ☣
Ultra_Sonic_Tracking
- How to Block the Ultrasonic Signals You Didn't Know Were Tracking You | WIRED
- Ultrasonic Signals Are the Wild West of Wireless Tech | WIRED
- 4 Reasons To Ditch Your Browser and Use Brave (and yes, one of them is Bitcoin)
- Syncthing | A Few Quick Thoughts
- Firefox Privacy - The Complete How-To Guide | Restore Privacy
- How to force Firefox to forget your browser history - TechRepublic
- "This add-on can access your data for all websites" - A security/privacy issue? (Firefox) - privacytoolsIO
- GitHub - urbanadventurer/Stop-tracking-me-on-reddit: Reddit is tracking every out-going link you click. Even if you are not logged in, every news article, image, or website you visit from Reddit is being recorded. Use this extension to block the tracking.
- can mozilla hand over your data to government at DuckDuckGo
- is having a firefox account a threat to privacy at DuckDuckGo
- Cross-site tracking: Let’s unpack that | The Firefox Frontier
- Browser detection using the user agent - HTTP | MDN
- How to Trick Websites into Thinking You're on a Different OS or Browser « Invisible Computer - fingerprint :: WonderHowTo
- How to disable Firefox's session restore crash recovery feature | How To Wiki | Browser privacy
Search_Engines_Comparison_Over_Privacy
Private_Search_Engines
- DuckDuckGo — Privacy, simplified. - Private Search Engine
- DuckDuckGo - Wikipedia
Startpage-Former_Ixquick
- Startpage.com - The world's most private search engine
- Startpage.com - Wikipedia
- Why does Google let Startpage access their search results? - Startpage.com Support
- Why do I get different results with Startpage.com than Google? - Startpage.com Support
- How Startpage.com keeps you out of the "Filter Bubble" - Startpage.com Support
- [Let's Think again] Startpage and DuckDuckGo are lying or not · Issue #168 · prism-break/prism-break - doubts · GitHub
- The Anonymous View Proxy—technical details - vs VPN - Startpage.com Support
- “Anonymous View” with the Startpage.com Proxy - vs VPN - browser fingerprinting
- Startpage.com Anonymous View allows you to surf the web anonymously - update : privacytoolsIO
- How does HTTPS encryption protect me? Does it keep my ISP from seeing me? - Startpage.com Support
- Qwant - The search engine that respects your privacy -- Private Search Engine
- Qwant - Wikipedia
- searx.me - Private Search Engine
- Searx - Wikipedia
- GitHub - asciimoo/searx: Privacy-respecting metasearch engine
- Disconnect Search: Search privately using your favorite search engine - Default search engine in Tor Browser
- Disconnect Mobile - Wikipedia
- Search Encrypt - The Privacy Based Search Engine - private
- Search Encrypt - Wikipedia
- search.privacytools.io - private search engine
- Searx - How to Create Your Own Search Engine for More Privacy & Zero Trust Issues - DuckDuckGo, Startpage - definitive guide on building own search engine « Null Byte :: WonderHowTo
- Comparison of web search engines - Wikipedia
- Search engine privacy - Wikipedia
- does using Google bang in duckduckgo keep Privacy - Google Search
- 10 Private Search Engines That Do Not Track You
- risk about sharing portable wifi hotspot at DuckDuckGo
- If I use !g in DuckDuckGo google keeps tracking me? : duckduckgo
- How anonymous is DuckDuckGo? - Quora
- startpage vs duckduckgo at DuckDuckGo
- I Stopped Using Google As My Search Engine, Here’s Why…
- The Best Private Search Engines — Alternatives to Google
- DuckDuckGo or Startpage? - SecuritySpread
- Private Search Engines: The Ultimate Guide (2019) - definitive comparison - metasearch vs search engine
- How ODNS keeps your browsing habits secret – Naked Security
Secure_Messaging_Apps
- Secure Messaging Apps Comparison | Privacy Matters
Telegram
- Malware infected fake Telegram Messenger app found in Play Store
- Zero-day vulnerability in Telegram - Securelist
- Hackers Exploit 'Telegram Messenger' Zero-Day Flaw to Spread Malware
- Critical Telegram flaw under attack disguised malware as benign images | Ars Technica
Skype
- Skype can't fix a nasty security bug without a massive code rewrite | ZDNet
- Why you need a better handle on the WhatsApp, Signal and Telegram apps - CNET
Signal_app
- Signal's "Sealed Sender" Is a Clever New Way to Shield Your Identity | WIRED
- Signal App's New Privacy Feature Conceals Sender ID from Metadata
- Signal Desktop Leaves Message Decryption Key in Plain Sight
- Signal (software) - Wikipedia
- Why We Should All Be Using the Encrypted Chat App Signal
- Signal Releases New Standalone Desktop Client - Deep Dot Web
- Signal app’s address book security could upset governments – Naked Security
- How to Use Signal - Motherboard
- Signal Encrypted Messenger on GNU/Linux - gHacks Tech News
- Hackers Reveal How Code Injection Attack Works in Signal Messaging App
- Another severe flaw in Signal desktop app lets hackers steal your chats in plaintext
- Serious XSS vulnerability discovered in Signal – Naked Security
- Self-destructing messages received on 'Signal for Mac' can be recovered later
- How do I verify the person I'm chatting with is who they say they are? – Support
- Amazon pushes Signal creators to change their anti-censorship tool
- 17-year-old finds screen lock bypass vulnerability in Signal app for iOS
- Signal Protocol - Wikipedia
Wickr
- Secure Chat App Wickr Thinks It’s Solved the Encrypted Conference Calls Problem
Whatsapp
- WhatsApp : un bogue de corruption mémoire qui pouvait être déclenché grâce à un simple appel vidéo, a été corrigé sur iOS et Android
- WhatsApp Encryption Security Flaws Could Allow Snoops to Slide Into Group Chats | WIRED
- Just Answering A Video Call Could Compromise Your WhatsApp Account
- thehackernews.com/2018/01/whatsapp-encryption-spying.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
- How to protect yourself against WhatsApp’s non-present backdoor | TechTalks
- How WhatsApp encryption works – and why there shouldn't be a backdoor
- WhatsApp is secure and OK for politicians to use, provided simple steps are followed
- mitm attack whatsapp encrypted message at DuckDuckGo
- ssl pinning whatsapp encryption at DuckDuckGo
- whatsapp encryption vs tls at DuckDuckGo
- Signal >> Blog >> WhatsApp's Signal Protocol integration is now complete
- 'Backdoor' in WhatsApp's end-to-end encryption leaves messages open to interception [Updated]
- Signal >> Blog >> Open Whisper Systems partners with WhatsApp to provide end-to-end encryption
- encryption - To what extent is WhatsApp's statement on secure messaging realistic? - Cryptography Stack Exchange
- encryption - Which Cryptography algorithm is used in WhatsApp end-to-end security? - Information Security Stack Exchange
- Encrypted messaging platform WhatsApp denies backdoor claim |
Ricochet
- Ricochet privacy at DuckDuckGo
- telegram vs signal - Google Search
- torchat vs irc vs signal - Google Search
- telegram vs signal - Google Search
- torchat vs irc vs signal - Google Search
- How to Use Private Encrypted Messaging Over Tor « Null Byte :: WonderHowTo
- The Motherboard Guide to Sexting Securely - Motherboard
- telegram vs signal - Google Search
- Facebook Finishes Its "Secret Conversations" Encryption Rollout to Messenger Users | WIRED
- 8 Best Secure And Encrypted Messaging Apps For Android & iOS
- Do The Right Things: Signal Messenger vs Wire Messenger - private voice communication
- Tor-based private messaging app Briar is out of beta
- FBI recovers WhatsApp, Signal data stored on Michael Cohen’s BlackBerry – Ars Technica
- Encrypted Messaging Apps Have Limitations You Should Know | WIRED
- Anonymous Chat Apps like Signal and Whatsapp Are Only as Private as the People You Talk To
- Privnote - Send notes that will self-destruct after being read
- Three Reasons Not to Use Skype
- Slantwise Action | How WhatsApp, Signal, and Steemit Are Feeding the Resistance
- why messaging apps need encryption if it uses + "https" - Google Search
- Why we still recommend Signal over WhatsApp ...even though they both use end-to-end encryption
- Why I told my friends to stop using WhatsApp and Telegram
- 4 Whatsapp Alternatives To Protect Your Privacy | Beencrypted
- Encryption - KryptoChat
Secure_Mail_Service
- Third-Party Apps May Read Your Email: Learn How to Protect - definitive
- How Secure Is Email?
ProtonMail
- ProtonMail Hits 5 Million Accounts and Wants Users to Ditch Google by 2021 | Inverse
- Hacker uses ProtonMail VPN. Hacker DDoSes ProtonMail. Hacker gets arrested. | ZDNet
- "ProtonMail Contacts" world's first encrypted contacts manager is here
- ProtonMail Bridge offers encryption for your go-to email client
- ProtonMail will use encryption to lock down your contacts list
- ProtonMail DDoS Attacks Are a Case Study of What Happens When You Mock Attackers
Comparison
- Gmail vs ProtonMail: Which is More Secure? - Motherboard
- The Only Reason to Still Use Yahoo Is for Your Garbage
- Got a Yahoo email account Here are 3 things you need to do now - MarketWatch
- Why You Should Not Use Yahoo Mail - LiteracyBase
- ☆ In what ways is Yahoo Mail better than Gmail? - Quora
- KMail Bug Sent Encrypted Emails in Plain-Text — for 4 years - OMG! Ubuntu!
- The 3 Most Secure & Encrypted Email Providers Online
- Snowden's preferred secure email service is making a comeback
- hackread.com/best-encrypted-email-services-2018/
- How PGP can protect you against email surveillance | TechTalks
- In Defense of Browser-Based Email Encryption
- Reminder—Third Party Gmail Apps Can Read Your Emails, "Allow" Carefully!
- Google admits third-party app developers read your Gmail emails
- Who's Reading Your Gmail Messages?
- 4 add-ons to improve your privacy on Thunderbird - Fedora Magazine
- The Definitive Guide to Email Encryption | S/MIME, PGPG/MIME - Outlook - iOS, Android - Secure/Privacy respectuous alternative email services as Hushmail, ProtonMail, Tutanota, Runbox, Mailbox - Burner/Disposable email to hide address
- 20 Sites to Send Anonymous Emails (2018) - Send Emails Without Registration - Disposable/Encrypted/Self-Destructing Emails
- Hack Like a Pro: How to Keep Your Internet Traffic Private from Anyone - TOR, VPN, CSpace, ZRTP - Encrypted P2P Chat and VoIP - Zimmerman « Null Byte :: WonderHowTo
- how to make sure a conversation is not listened on mobile - Google Search
- Find out if your password has been pwned—without sending it to a server | Ars Technica
- A cartoon intro to DNS over HTTPS – Mozilla Hacks – the Web developer blog
- MIT CSAIL Parallel and Distributed Operating Systems Group
- How To Encrypt BitTorrent Traffic – Complete Guide
- Can we trust closed encryption protocols? | Two Cents Security
Privacy_In_The_Cloud
- Do VPS providers look inside your VPS? | Web Hosting Talk
- Can we trust cloud providers to keep our data safe? - BBC News
- Just how trustworthy are your public cloud services? - TechGenix
- How Reliable is the Cloud? | NIRIX
- The cloud: will it ever be trustworthy enough for your precious data? | TechRadar
- Avoid this privacy folly when sharing on Google Docs | TechTalks
Public_Computer_Usage
- If I open a document from a USB flash drive but do not save it to the computer, can someone access the file’s contents after I remove the drive? - Super User
Physical-Personal_Privacy
Personal_Geolocation_Privacy
- Shoddy security of popular smartwatch lets hackers access your child’s location
- Location tracking | physical privacy - GPS tracking - Me and my Shadow
- T-Mobile, Sprint, and AT&T Are Selling Customers' Real-Time Location Data, And It's Falling Into the Wrong Hands - Privacy Violation, Surveillance, Geolocation/Physical Privacy
- Locational Privacy - geolocation
- Seeker v1.0.7 - Get Accurate Location using a Fake Website - KitPloit - PenTest Tools for your Security Arsenal ☣
Identity_Theft
- How Your Mouse Movement Could Be Used to Stop Identity Theft
- Credit Freezes are Free: Let the Ice Age Begin — Krebs on Security
- why social security number is sensitive at DuckDuckGo
- can the border police compels you to unlock your laptop at the airport at DuckDuckGo
- Why Location Privacy Matters
- How to stop Android apps from accessing your location | AndroidPIT
- How to stop Google from tracking you on Android and iPhone
- Facial Recognition and Public Privacy
- Streisand effect - privacy enforcement reverse effect - personal privacy - Wikipedia
- How does Tor protect against an attacker just running thousands of nodes? - Information Security Stack Exchange
- StreisandEffect/streisand - Bypass censorship · GitHub
Anonymity
- 4Nonimizer - A Tool For Anonymizing The Public IP Used To Browsing Internet, Managing The Connection To TOR Network And To Different VPNs Providers - KitPloit - PenTest Tools for your Security Arsenal ☣
Deep_Web-Dark_Web
Tracking_Tools_Against_Darknets
- DarkOwl - Darknet Big Data
Tor
Tor_Weaknesses
Exit_Node_Dangers
- Tor exit node admin acquitted of aiding terrorism – Naked Security
- How much information can be sniffed at tor exit nodes - Information Security Stack Exchange
- The risk to Tor exit nodes - Information Security Stack Exchange
- Misconfigured Tor sites using SSL certificates exposing public IP addresses
- Tor Browser Zero-Day Exploit Revealed Online – Patch Now
- Security firm uses Twitter to disclose critical zero-day flaw in Tor Browser
- Public IP Addresses of Tor Sites Exposed via SSL Certificates
- is it possible to conduct ddos attack against Tor - Google Search
- New attack on Tor can deanonymize hidden services with surprising accuracy | Ars Technica
- is it possible to conduct ddos attack against Tor - Google Search
- How the NSA (Or Anyone Else) Can Crack Tor's Anonymity - Motherboard
- "One cell is enough to break Tor's anonymity" | Tor Blog
- 81 percent Tor users is identifiable with traffic analysis attackSecurity Affairs
- is it possible to conduct ddos attack against Tor - Google Search
- https://www.google.com/url?sa=t&rct=j&source=web&url=https://security.radware.com/uploadedfiles/resources_and_content/attack_tools/shooting_behind_the_fence_ert_research_paper.pdf&ved=2ahUKEwjS1oyWqbDXAhUDmoMKHcZaAawQFjADegQIBxAB&usg=AOvVaw2fAfOYMsIOckugL
- Tor Browser Updates Patch IP Leaking TorMoil Bug - Deep Dot Web
- German Intelligence First Developed Attacks Against Tor
- The FBI Booby-Trapped a Video to Catch a Suspected Tor Sextortionist - Motherboard
- Don't Use This "Fake TOR Browser" — Scammers Are Fooling People
- entry guards | Tor Blog
- sybil attack tor at DuckDuckGo
- Sybil attack - Wikipedia
- How to make Tor less vulnerable to RAPTOR attacks - TechRepublic
- Improving Tor's anonymity by changing guard parameters | Tor Blog
- Can you trust Tor’s entry guards? – Naked Security
- tor entry point dangers at DuckDuckGo
- Tor Project: FAQ
- Tor Project: Bridges
- Tor Project: FAQ
- how to traceroute tor proxy and see other routers in tor network? - Stack Overflow
- Cybercriminals Stealing From Cybercriminals Ransomware Victims Left StrandedSecurity Affairs
- Tor Project "Almost 100% Funded By The US Government": FOIA | Zero Hedge
- Why BBG needs Tor & its influence over the ‘anonymous browser’ — RT US News
- determining tor origin traffic - Google Search
- Is Tor Safe? | Assessing 5 Claims About Tor’s Security
- Tor Browser - What You Really Need to Know (Read This First) - VPN vs Tor - definitive enumeration of all Tor weaknesses and risks - Military use of Tor, U.S government fund, Snowden promotion of Tor - Multi-Hop VPNs providers NordVPN among others - Self-configurable multi-hop VPNs, Perfect Privacy and Zorro VPN among others - Virtual machines VMs with VPNs, nestes VPN chains, VPN within a VPN - VPN and Tor combination, VPN service that has servers exiting onto the Tor network, NordVPN and ZorroVPN among others -
- privacy - Best practices for Tor use, in light of released NSA slides - definitive guide on how to effectively use Tor to mitigate its inherent risks - Information Security Stack Exchange
- webserver - What are the disadvantages of Tor? - Information Security Stack Exchange
- What is the Tor Network and Browser and how can you use it safely? Tor over VPN, VPN over Tor - China Ban - Tor Messenger, Atlas, Nyx, Onionoo, OONI, Pluggable Transports, Shadow, Tails, TorBirdy, Tor2Web -
- How DNS can be used to unmask Tor users | Weaknesses - Anonymity
- Things to Avoid While Accessing the Deep Web – vs Dark Web
- TOR Anonymity: Things Not To Do While Using TOR - IMEI Phone Tracking - Anonymmity vs Pseduonymity - HTTP on Tor - Google on Tor
- 11 Do's and Don'ts of Tor Network - Tor on Windows - Using real email - Peer to peer P2P - LUKS FDE - HTTP -
- anon surf module equivalent on kali - Google Search
- how to route all traffic through tor on linux - Google Search
- anon surf change identity feature - Google Search
- How to Install TOR on Android and iOS Devices
- benefit of running own tor relay - Google Search
- GitHub - Und3rf10w/kali-anonsurf: A port of ParrotSec's stealth and anonsurf modules to Kali Linux
- Tor Project: Abuse FAQ
- Tor Project: Projects Overview
- benefit running own tor relay node - Google Search
- 5 Ways to Stay Safe From Bad Tor Exit Nodes
- legal - What are the implications of running a TOR non-exit relay node? Traffic Analysis - plausible deniability - Information Security Stack Exchange
- Connecting to an authenticated Onion service · AnarchoTechNYC/meta Wiki
- Meet Nyx, a Command-Line Tor Relay Monitor | Tor Blog
- We’re Upping Our Support to Mobile Browsing | Tor Blog
- Anonymous Browsing in a Click: Add a Tor Toggle Button to Chrome « Invisible Computer :: WonderHowTo
- 5 Good Reasons to Give Tor a Try
- What is Tor?
- Can I detect when someone is connecting to my server via Tor? - Tor Stack Exchange
- Tor Project: FAQ
- how do onion sites browsing actually work - Google Search
- .tor - Wikipedia
- new identity feature tor - Google Search
- new identity vs change tor circuit for this site tor - Google Search
- how to route all traffics through tor kali linux - Google Search
- Tor exit node vs Tor relay nodes - Google Search
- what are tor hidden services - Google Search
- www.google.com
- Tor's Fall Harvest: the Next Generation of Onion Services | Tor Blog
- Même le réseau Tor n'échapperait pas à la surveillance de la NSA et du GCHQ, selon un expert en sécurité
- The Grand Tor: How to Go Anonymous Online | WIRED
- tor choose exit node - Google Search
- Tor Project: Overview
- GitHub - ruped24/toriptables2: Tor Iptables script is an anonymizer that sets up iptables and tor to route all services and traffic including DNS through the Tor network.
- Nipe - A Script To Make TOR Network Your Default Gateway - KitPloit - PenTest Tools for your Security Arsenal ☣
- Multitor - A Tool That Lets You Create Multiple TOR Instances With A Load-Balancing - KitPloit - PenTest Tools for your Security Arsenal ☣
- what are bridges in tor at DuckDuckGo
- no internet access with orbot on android at DuckDuckGo
- doc/TransparentProxy – Tor Bug Tracker & Wiki
- doc/Torouter – Tor Bug Tracker & Wiki
- This is What a Tor Supporter Looks Like: Edward Snowden | Tor Blog
- Setting up an exit node on VPS along with a VPN. Impact to anonymity? - Tor Stack Exchange
- Can somebody clarify the Tor --> VPN and VPN --> Tor notation please? - Tor Stack Exchange
- Five Years as an Exit Node Operator | Tor Blog
- Why would anyone setup a TOR relay? Time correlation attacks : TOR
- Really Private Browsing: An Unofficial User’s Guide to Tor
- Tor (anonymity network) - Onion Services - Security Weaknesses - Heartbleed - Security/Privacy-focused operating systems
- Introducing DNS Resolver for Tor
- Is there a domain name resolution when you access a .onion website? Can a .onion be converted into an IP address? How does it work? - Quora
- Achieving Anonymity with Tor Part 1
- https://resources.infosecinstitute.com/tor-part-2/
I2P
- Through A Network, Darkly | A Geographic Look At I2P
- I2P | An Infographic
- I2P Services | A Curated Guide to I2P
- I2P - Wikipedia
- How to set up untraceable websites (eepsites) on I2P
- I2P Guide: How to Use I2P and More!
- How To Use I2P | I2P Tutorial & Setup Guide
I2P_Weaknesses
- Darknets and hidden servers:Identifying the true IP/network identity of I2P service hosts
FreeNet
Onion_Service_Protocol
- hidden services - .onion Domains DNS lookup - Tor Stack Exchange
- .onion - .exit -
- Onion routing - security weaknesses
- Tor: Onion Service Protocol
- Tor: Onion Service Protocol - definitive official explanation of hidden services access - search engine
- How does DNS resolving work for Tor Hidden Services? Search Engines - definitive breakdown of hidden services acces - hash table mapping .onion addresses to hidden services descriptors
- Cooking With Onions: Names for your onions | Onion Addresses - hidden services
Anonymity_Networks_Comparison
- Tor vs I2P Review : privacy
- I2P Compared to Tor - I2P
- Anonymity Networks. Don't use one, use all of them! « Null Byte :: WonderHowTo
- I2P vs. Tor vs. VPN: Which Is More Secure?
- Tor vs. I2P: The Great Onion Debate « Null Byte :: WonderHowTo
- Kushal Bahirwani's answer to In your opinion is it better to use Tor, I2P or GNUnet? - Quora
- Tor and Its 10 Best Alternatives
- I2P vs TOR: What are the Major Differences
- I2P Compared to Tor and Freenet - I2P
- Tor vs. I2P — DarkOwl - Darknet Big Data
Hidden_Services_Lists
- Deep Web Search Engines to Explore the Hidden Internet
- Ex-Facebook Engineer Creates Wikipedia Dark Web Version
- How to Find Active .Onion Dark Web Sites (And Why You Might Want To)
- The Best Dark Web Websites You Won't Find on Google - Dark Web vs. Deep Web
- List of Tor onion services - Wikipedia
- how to route all traffics through i2p kali linux - Google Search
- how to route all traffics through i2p kali linux - Google Search
- Dark web doesn't exist, says Tor's Dingledine. And folks use network for privacy, not crime • The Register
- Hiding out among the net's criminal class - BBC News
- How to Install ParrotSec Sealth and Anonsurf Modules on Kali 2.0 « Null Byte :: WonderHowTo
- benefit of https for onion server - Google Search
- .bit - Wikipedia
- how to route all traffics through i2p kali linux - Google Search
- Anonymity, Darknets and Staying Out of Federal Custody, Part One: Deep Web « Null Byte :: WonderHowTo
- why are onion addresses not human readable - Google Search
- 6 Reasons You Should Avoid the Dark Web
- What Is the Dark Web?
- The Internet you can't Google
- Deep Web Search Engines List to Explore Dark Web - DuckDuckGo
- Dark Web Links | Dark Web Sites - Reference - Recommended Steps Everyone Should Follow before Exploring Dark Web Links - Tor - Bitcoin, Monero
- Deep Web Books Links | Dark Web eBooks Sites
- 18 Deep Web Stories: Horror, Scary, Creepy & Disturbing (+True)
- Google Can’t Search the Deep Web, So How Do Deep Web Search Engines Work? Why Standard Search Engines Can't Crawl/Index Deep/Dark Web
- Darknet - Wikipedia
- Dark web - Wikipedia
- Why can't we access the sites in the Deep Web (Onion/Tor) without a specially built browser? - Quora
- How to Access Onion Sites - with VPNs
- How to Access the Dark Web and the Deep Web, Safely and Anonymous - Tor with VPN, Tails OS
References
- Why can't search engines reach the dark web? - Information Security Stack Exchange
- Why doesn't Google index the Dark Web / Deep Web? - standard search engine
- hidden services - How do I find onion sites? - Tor Stack Exchange
- Best of Two Worlds: Accessing I2P and Tor (and clearnet) seamlessly with Orchid
- why onion sites cannot be reached though classic search engine at DuckDuckGo
Deep_Web_Search_Engines
- Deep Web Search Engine alternative to Google for 2019 - Top 10
- 10 Must-Have Tor / Darknet Search Engines for the Dark Web- dr.fone
Anonymity_Throughout_Attack_Processes
- TimpDoor Android malware turning devices into hidden proxies
- Dark web kingpin visiting US for beard competition gets 20 years in prison
- Russian man charged over 'massive' US hack attacks - BBC News
- Russian Hacker Pleads Guilty to Operating Kelihos Botnet
- Russian man pleads guilty, admits he ran notorious Kelihos botnet | Ars Technica
- TypoGuy Explaining Anonymity: A Hackers Mindset « Null Byte :: WonderHowTo
- How to Stay Anonymous While RATting (Level: Paranoid) - VPN, No-IP - worn second-hand laptop - RAT, VPN jurisdiction, No-IP « Null Byte :: WonderHowTo
- Keeping Your Hacking Identity Secret « Null Byte :: WonderHowTo
- how to edit wikipedia anonymously - Google Search
- is it possible to be caught when using public wifi at DuckDuckGo
- tor vs vpn for hacking at DuckDuckGo
- How to Remove Your Online Identity: The Ultimate Guide to Anonymity and Security on the Internet « Null Byte :: WonderHowTo
Anonymous_Online_Payment
Cryptocurrency_Anonymity
- Ledger Nano S Review | Why You Need a Bitcoin Hardware Wallet
- Home | Monero - secure, private, untraceable
- Cryptocurrency Monero Is Skyrocketing Thanks to Darknet Druglords | WIRED
- Monero vs DASH vs Zcash vs Bitcoin Mixers
- Is Bitcoin Actually Private?
- https://en.wikipedia.org/wiki/Zcash
- https://www.quora.com/What-is-a-good-Anonymous-Crypto-Currency
- https://duckduckgo.com/?q=zcash+vs+bitcoin&t=ffab&ia=web
- https://www.coindesk.com/the-structure-and-valuation-of-zcash-vs-bitcoin/
- https://www.buybitcoinworldwide.com/zcash/
- https://z.cash/
- https://www.monero.how/why-monero-vs-bitcoin
- https://www.monero.how/how-does-monero-privacy-work
- https://duckduckgo.com/?q=monero+vs+bitcoin&t=ffab&ia=web
- https://www.dash.org/
- https://duckduckgo.com/?q=dash+vs+zcash&t=ffab&ia=cryptocurrency
- https://www.comparitech.com/crypto/anonymous-cryptocurrency-monerto-zcash/
- https://duckduckgo.com/?q=privacy+cryptocurrency+bank+transfer&t=ffab&ia=web
- https://duckduckgo.com/?q=cash+out+crypto+currency+anonymously&t=ffab&ia=web
- https://www.quora.com/What-is-the-most-private-Monero-or-Zcash
- https://www.quora.com/If-one-opens-a-crypto-currency-account-anonymously-how-does-he-cash-out
- https://duckduckgo.com/?q=electrum+wallet&t=ffab&ia=web
- Bitcoin Private - Wikipedia
- Your Sloppy Bitcoin Drug Deals Will Haunt You for Years | WIRED
- paying anonymously on internet at DuckDuckGo
- paying a vpn anonymously at DuckDuckGo
- can you be tracked if you pay in bitcoin at DuckDuckGo
- paypal vs debit card at DuckDuckGo
Internet_Relay_Chat
- How to Host a Deep Web IRC Server for More Anonymous Chatting « Null Byte :: WonderHowTo
- ZNC - IRC bouncer
- Hack Like a Pro: How to Install & Use a Secure IRC Client with OTR - Off The Record - Internet Relay Chat - Null Byte - WonderHowTo
- IRC Guide - Internet Relay Chat - HexChat installation guide
- Are there any security risks to using IRC? Internet Relay Chat : irc
- botnet - How is IRC so secure/untraceable that hackers and pirates use it to communicate? Internet Relay Chat IRC security - botnet, control and command C2 servers - privacy, anonymity, use of proxy/vpn
- Internet Relay Chat - Security, Attacks, takeovers, ICMP based DDoS - services - clients, bots, bouncers - SDCC - character encoding format
- Comparison of Internet Relay Chat IRC daemons - Wikipedia
- IRCd - daemon - IRC server - vs bot, client - ports 6665 to 6669, with 6667 being the historical default
- Comparison of mobile Internet Relay Chat clients - Wikipedia
- IRC bot - Wikipedia
- Direct Client-to-Client/Connections - DCC - IRC-related sub-protocol enabling peers to interconnect using an IRC server for handshaking in order to exchange files or perform non-relayed chats. Once established, a typical DCC session runs independently from the IRC server
- Pidgin (software) - Off The Record OTR Messaging - IRC
- irc: message notification when away (xchat) - znc
- Having Slack-like features on IRC? : irc
- DCC through a heavily firewalled ZNC? : irc
- How to Use ZNC - YouTube
- Is there a benefit to using ZNC on my VPS or just having weechat running on it all the time? : irc
- Learn how to install and use the ZNC chat bouncer | definitive IRC client/server configuration - HexChat
- ZNC_IRC_bouncer - Debian Wiki
- ZNC - IRC
- FAQ - ZNC
- IRC Bouncer on a Pi | ZNC
- Tails - Chatting with Pidgin - IRC over OTR - Tor
- Freenode - formerly known as Open Projects Network, is an IRC network used to discuss peer-directed projects
- Comparison of Internet Relay Chat IRC clients - OTR support
- ZNC - IRC BNC bouncer - IRC server
- BNC (software) - Bounced Network Connection - privacy - IRC Proxy
- does irc support encryption? | Hacker News
- tcp - Is SSL/TLS pointless for IRC? hash - MitM
- Improving IRC security step by step - SSL/TLS, Strict Transport Security - MitM - OTR -
- otr - ZNC - IRC
- irc cheat sheet · GitHub
- IRC Wiki - The Internet Relay Chat wiki - clients, bots and servers
- OTR.im - Whispering Off The Record - compatible instant messaging clients - IRC
- Wikipedia:IRC/Tutorial - clients
- Connecting to IRC with HexChat - IRC Wiki
- Beginner's guide to IRC - Fedora Magazine
Personal_Anonymity
Physical_Anonymity
- is it possible to erase your fingerprints - Google Search
- is it possible to erase your fingerprints - Google Search
- 10 Best Voice Changer Apps - You Must Download - Tech in Mind
- is it possible to erase your fingerprints - Google Search
Speech_Pattern_Obfuscation
- rephrase tool at DuckDuckGo
- How to Become Anonymous & Browse the Internet Safely « Null Byte :: WonderHowTo
- TypoGuy Explaining Anonymity: Your Real Identity « Null Byte :: WonderHowTo
- How to Stay as Anonymous as Possible Online « Null Byte :: WonderHowTo
- How to be Anonymous: Beginner Level Part -4 - Develope IT
- How to Hide Your IP Address in PC and Smartphone for Online Security
- How to Change your IP address in five different ways « Internet :: Gadget Hacks
- How to Use a proxy with Firefox to hide your IP address « Internet :: Gadget Hacks
VPNs
VPN_Weaknesses
- Don't ever use a VPN without paying attention to these five things
- Almost Every Major Free VPN Service is a Glorified Data Farm
- Security Holes Discovered in 2 Popular VPN Services - ExtremeTech
- Privilege Escalation Bug Found in Popular VPN Clients
- Don't use VPN services. - VPNs weaknesses
Theory
VPNs_Protocols
- s2s vpn at DuckDuckGo
- Generic Routing Encapsulation - GRE - vs PPTP, IPSec
- Point-to-Point Tunneling Protocol - PPTP - VPNs - security vulnerabilities -MPPE, PPP, MS-CHAP-v1,MS-CHAP-v2, EAP-TLS - GRE
- Layer 2 Tunneling Protocol - Tunneling protocol used to suppport VPNs - L2TP
- Secure Socket Tunneling Protocol - SSTP - VPN Protocol
- OpenVPN - custom security protocol that utilizes SSL/TLS for key exchange.
- SoftEther VPN - is free open-source, cross-platform, multi-protocol VPN client and VPN server software
- OpenConnect is an open-source software application for connecting to virtual private networks (VPN), which implement secure point-to-point connections - Cisco AnyConnect
- IPsec - Internet Protocol Security - VPN Protocol - As a part of the IPv4 enhancement, IPsec is a layer 3 OSI model or internet layer end-to-end security scheme - vs TLS, SSH
- What is GRE Tunnel - Generic Routing Encapsulation - vs IPSec VPN - DDOS - Definitive breakdown
- Use cases for GRE over IPSEC - MPLS over GRE over IPSec - EIGRP, GRT, IKEv1/2,
- What is the difference between L2TP vs GRE - L2F layer 2 forwarding
- How IPsec tunnel mode work without GRE - Network Engineering Stack Exchange
- Does GRE Tunneling "really" hide your main IP? GRE is an unencrypted tunnel protocol - government subpoena, VPN ,Tor
- How GRE Tunnels Work | VPN Tunnels Part 1 - YouTube
- What are the differences between an IPSec VPN and a GRE tunnel? leased-line WAN - multicast traffic forwarding
- The race towards convergence is what awaits VPNs | TechRadar
- What Is a VPN, and Why Would I Need One?
- Putin bans VPNs in web browsing crackdown - BBC News
- Private Internet Access – Get a Secure VPN to Protect Your Online Privacy
- OpenVPN Access Server is an SSL VPN based on open source software
- Hotspot Shield VPN Accused of Spying On Its Users' Web Traffic
- ProtonMail makes its free VPN service available to everyone
- file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Security/wp-do-you-need-a-vpn-firewall-or-both.pdf
- file:///media/programmersn/NOUAIM/Studies/Documentation/Computer_science/Security/WP_CS_VPN.pdf
- A Glance through the VPN Looking Glass: IPv6 Leakage and DNS Hijacking in Commercial VPN clients
- Anonymity and Privacy Techniques - YouTube
- Virtual Private Networks, an Introduction - YouTube
- ما هو الـ proxy ؟ ما الفرق بين ال Proxy و الـ VPN ؟ - YouTube
- What is a VPN? - Gary explains - YouTube
- Everything Linux Users Need to Know About Installing a VPN
- VPN - The Must Have Anonymity Tool | Dark Web News
- A VPN can stop internet companies from selling your data — but it’s not a magic bullet - The Verge
- What to look for in a VPN to protect your privacy | Computerworld
- vpn with warrant canary - Google Search
- how better is a vpn from https - Google Search
- network - What is the difference in security between a VPN- and a SSL-connection? - Information Security Stack Exchange
- VPNs: What They Do, How They Work, and Why You're Dumb for Not Using One
- hidemyass - Google Search
- hotspotshield - Google Search
- expatshield - Google Search
- proxpn - Google Search
- Tor Project: FAQ
- A VPN can protect your online privacy. But there's a catch - CNET
- 5 Common VPN Myths and Why You Shouldn't Believe Them
- TypoGuy Explaining Anonymity: Choosing a Good VPN « Null Byte :: WonderHowTo
- Finally, A VPN explanation for the non-technical world
- Virtual private network - GRE
- The 5 Major VPN Protocols Explained
- How VPNs Work to Protect Privacy, and Which Ones to Use | WIRED
- Can A VPN Bypass Net Neutrality Rollback And Throttling? — Here Are 3 Top Services To Help You
- 7 Tips on How to Use a VPN Like a Boss
- How a VPN download can save you a lot of money - Android Authority
- VPN vs Cloudflare DNS | TechRadar
- 7 Reasons Why VPNs Might Die Out by 2020
- 5 Ways Your VPN Is Not as Private as You Think It Is
- Does VPN Alone Provide Web Anonymity? No, but It Comes Close with Tor and More - N
Practice
Building_Own_VPN
- how a own hosted vpn is better - Google Search
- how a own hosted vpn is better - Google Search
- How to build your own VPN if you’re (rightfully) wary of commercial options | Ars Technica
- how a own hosted vpn is better - Google Search
- How I made my own VPN server in 15 minutes | TechCrunch
- How to Set Up Your Own Completely Free VPN In the Cloud
- anonymity - What are the advantages of paying for a VPN service as opposed to hosting your own? - Information Security Stack Exchange
- Nyr/openvpn-install: OpenVPN road warrior installer for Debian, Ubuntu and CentOS
- prometheus cloud - Google Search
- ramnode dmca - Google Search
- seedbox - Google Search
- web seeds - Google Search
- vpn on vps - Google Search
- What is the risk of running VPN on VPS? - Information Security Stack Exchange
- How to set up and run your own VPN server on Windows | PCWorld
- 6 open source tools for making your own VPN | Opensource.com
- Set Up Your Own VPN, Without the Expensive Software
- How to Set Up Your Own Home LAN VPN Server - performance/bandwidth concerns
- OpenVPN vs IPSec, WireGuard, L2TP, & IKEv2 (VPN Protocols 2019) - definitive
VPN_Providers
- Researcher Claims Hotspot Shield VPN Service Exposes You on the Internet
- ProtonVPN Subscriptions Now Available on Firefox for $10
- Be cautious, free VPNs are selling your data to 3rd parties
- Pornhub's VPNhub is a free VPN for everyone
- The best VPN service
- Leaking VPNs: 17 VPN Services Found To Leak Your IP Address
- How a VPN is Saving My Butt in Europe
- No Logs VPN Services That Have Actually Been Proven True
- I Am Anonymous When I Use a VPN - 10 Myths Debunked - privacy, vs TOR, VPN provider | Golden Frog
- Best VPN Services 2019 (What You're Not Being Told) - definitive criterias presentation | RestorePrivacy
- Perfect Privacy VPN Provider - Multi-Hop: Advantages of a cascaded VPN connection
- Hotspot Shield - Free VPN service
- Definitive comparison of virtual private network services - Anonymous Payment methods
- How Get Free Movies and TV Using a VPN
- This Massive VPN Comparison Spreadsheet Helps You Choose the Best for You
- How to Chain VPNs for Complete Anonymity « Null Byte :: WonderHowTo
- 7 open source VPN tools for businesses | Opensource.com
- How to Check if Your VPN Connection is Actually Encrypted
- Multi-Hop VPNs for Maximum Privacy & Security (How-To Guide)
- How to Set Up IPsec LAN To LAN VPN Tunnel Main Mode between Two Vigor Routers - YouTube
- IPsec Tunnel in Main Mode between DrayTek Routers | DrayTek
- Configuring LAN-to-LAN IPsec VPNs
- How To Setup VPN On Router & Secure All Devices
- 5 Best DD-WRT Routers 2019| How to Install DD-WRT VPN - ProPrivacy.com
- Best VPN routers 2019: the best routers for Virtual Private Networks | TechRadar
- How to build a VPN client on a secondary home LAN router - definitive hands-on detailed guide - DD-WRT - | TechRadar
- 4 Reasons to Set Up a VPN client on Your home LAN Router (Instead of Your PC)
- Setting Up a Router VPN client : The Ultimate Guide - pre-flashed VPN routers, flashing VPN router with VPN compatible firmware - definitive tutorial | TheBestVPN
- Why Is Everyone Talking About VPNs?
- The Laziest, Cheapest Way to Circumvent Your Snooping ISP
- Why You Should Get a VPN for Your Xbox One or PS4
- Privacy in America Now Starts With a VPN | A Brief Note on Threat Modelling and Lesser Evils
- From cybercrime to cyber defence: How VPNs went mainstream
Proxies
- How To Use Google As Proxy Server – Incognisys
- What is a Proxy? - YouTube
- How To Use Proxychains To Evade Detection in Kali Linux - Coding Security
- sock5 proxy what is - Google Search
- do proxies use unlimited bandwidth - Google Search
- What are the best internet proxies that are good for high bandwidth content? - Quora
- How to Sneak Past Web Filters and Proxy Blockers with Google Translate « Null Byte :: WonderHowTo
- What is a Proxy Server and should you risk using one?
- How to Browse securely with SSH and a SOCKS proxy « Internet :: Gadget Hacks
- How to View blocked sites with a free proxy website « Internet :: Gadget Hacks
- How to Get passed blocked sites using proxy servers « Internet :: Gadget Hacks
- How to Use a proxy and understand why they are important « Internet :: Gadget Hacks
- Hack Like a Pro: How to Evade Detection Using Proxychains « Null Byte :: WonderHowTo
- tor - how to verify that proxychains is working - Super User
Anonymity_Tools_Comparison
- why would we need vpn if we have https - Google Search
- anonymity - Security of Tor compared to VPN - Tor Stack Exchange
- 4 Easy Ways to Hide Your IP Address [Updated]
- We know that VPN and proxy change IP addresses, but what is the difference between them? | Virtual Private Networks
- proxifier vs proxychains at DuckDuckGo
- encryption - Is using Tor and VPN combination more secure? - Information Security Stack Exchange
- encryption - Is using VPN, Tor and ProxyChains together more secure? - Information Security Stack Exchange
- Tor Project: FAQ
- Tor And VPN | Using Both For Added Security
- Tor or VPN - Which is Best for Security, Privacy & Anonymity? [2019]
- Tor or VPN – Which is Best for Security, Privacy & Anonymity? Advantages When Used Together - Tor over VPN, VPN over Tor- BinaryHints
- What's the difference between privacy and anonymity? Comparison TOR vs VPNs vs Proxies - Information Security Stack Exchange
- anonymity - VPN vs VPS vs TOR vs ANON_PROXY? - Information Security Stack Exchange
- privacy - Why is Tor safer than a proxy? - Information Security Stack Exchange
Resources
- Search Encrypt Blog - Privacy and Cybersecurity Tools, Tricks and News
Misc_Private-Anonymous_Tools_Alternatives_Lists
- Privacy Tools - How to Restore Your Online Privacy in 2019
- GitHub - nikitavoloboev/privacy-respecting: Curated List of Privacy Respecting Services and Software Alternatives
- Opt out of global data surveillance programs like PRISM, XKeyscore, and Tempora - PRISM Break - Privacy-respectuous and security-aware alternatives to proprietary software - PRISM Break
- PRISM Break - source code · GitLab
- Alternatives to Google Products (Complete List) | Restore Privacy
- What's YOUR Privacy Setup? good privacy respectuous alternatives suggestions - privacytoolsIO
- A New World of Opportunity — Inrupt
- One Small Step for the Web… – Tim Berners-Lee – Medium
- 25 Google Alternatives - Take Control of Your Privacy
- 8 of the Best Google Maps Alternatives You Should Try – Make Tech Easier
- how to stop using google while using android at DuckDuckGo
- Here's How You Can Use Android But Ditch Google
- Anti-Forensics - Rendering Digital Investigations Irrelevant. - privacy/anonymity resources
- Resources - Privacy.net
- One man's fight against the invasion of our privacy online | Privacy.net
- Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications
- Privacy Tools - Encryption Against Global Mass Surveillance - warrant canary - Snowden quotes - Nothing to hide argument
- Restore Privacy - privacy respectuous alternative tools| Your online privacy resource center
- Home | Me and my Shadow
- Be Encrypted - Fight Against Data Theft & Cybercrime
- The Tin Hat
- Electronic Frontier Foundation | Defending your rights in the digital world
- About Free Software Foundation Europe - FSFE - privacy/anonymity resources
- Privacy vs. Anonymity - for VPN, among others -- vpn.ac | blog
- Anonymity vs Privacy vs Security
Cyber-Warfare
- The US Didn’t Sign the Paris Call for Trust and Security in Cyberspace | WIRED
- The Collateral Damage of Trump's Extreme Declassifications | WIRED
- What is cyberwar? Everything you need to know about the frightening future of digital conflict | ZDNet
- How Obama Made It Easier for Trump to Launch a Nuke - POLITICO Magazine
Governmental_Intelligence_Agencies
Saudi_Agencies-Linked_Groups
- Hackers deface Saudi ‘Davos in the Desert’ site against Khashoggi's death
French_Agencies-Linked_Groups
- France : l'Assemblée nationale adopte le texte des propositions de loi sur les infox en période électorale, par 45 voix contre 20
- Un agent de la DGSI mis en examen pour avoir vendu des informations sur le darknet, jusqu'à dévoiler votre vie complète (RIB, géolocalisation, etc.)
USA_Agencies-Linked_groups
High-Profile_Government_Operatives
- Trump's Personal iPhone Would Be a National Security Risk | WIRED
- Pentagon Weapons Systems Are Easy Cyberattack Targets, New Report Finds | WIRED
- How the US Halted China’s Cybertheft—Using a Chinese Spy | WIRED
- US weapons systems can be 'easily hacked' - BBC News
- Major weapon systems developed by US DoD highly vulnerable to cyber attacks
- Senate passes bill that lets the government destroy private drones
Vault7
- 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
- 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
- Leaked NSA Hacking Tools Being Used to Hack Thousands of Vulnerable Windows PCs
- 10 Things You Need To Know About 'Wikileaks CIA Leak'
- Vault 7 : WikiLeaks révèle que le logiciel Athena, utilisé dans les opérations d'espionnage de la CIA, peut infecter toutes les versions de Windows
- This Is How the NSA Infiltrated a Huge Banking Network in the Middle East - Motherboard
- 3 New CIA-developed Hacking Tools For MacOS & Linux Exposed
- CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
- EternalRocks worm combines seven leaked NSA attack tools
- Cyberspies Are Using Leaked NSA Hacking Tools to Spy On Hotels Guests
- Linux malware: Leak exposes CIA's OutlawCountry hacking toolkit | ZDNet
- CouchPotato: CIA Hacking Tool to Remotely Spy On Video Streams in Real-Time
- Shadow Brokers Leaks Another Windows Hacking Tool Stolen from NSA’s Arsenal
- AngelFire: CIA Malware Infects System Boot Sector to Hack Windows PCs
- WikiLeaks releases Manual for Linux Implant “Aeris” - gHacks Tech News
- WikiLeaks: The CIA can remotely hack into computers that aren't even connected to the internet — Quartz
- Wikileaks Unveils CIA's Man-in-the-Middle Attack Tool
- Cisco Finally Patches 0-Day Exploit Disclosed In Wikileaks-CIA Leak
- WikiLeaks Reveals 'AfterMidnight' & 'Assassin' CIA Windows Malware Frameworks
- Newly Found Malware Uses 7 NSA Hacking Tools, Where WannaCry Uses 2
- WikiLeaks Reveals 'Athena' CIA Spying Program Targeting All Versions of Windows
- US military will finally start encrypting soldiers' emails
- Here's How CIA Spies On Its Intelligence Liaison Partners Around the World
- NSA vs Shadow Brokers
- Kaspersky: Yes, we obtained NSA secrets. No, we didn’t help steal them – Ars Technica
- The Pentagon Left Data Exposed in the Cloud
- Canadians Are Worried About NSA Spying But Don’t Understand How It Happens - Motherboard
- WikiLeaks Reveals CIA Teams Up With Tech to Collect Ideas For Malware Development
- New NSA leak exposes Red Disk, the Army's failed intelligence system | ZDNet
- CIA to continue cloud push in the name of national security | ZDNet
- CIA uses a secret tool to spy on NSA, FBI and other intel partners
- FBI can’t break the encryption on Texas shooter’s smartphone – Ars Technica
- NSA's Ragtime program targets Americans, leaked files show | ZDNet
- Hacker Who Hacked US Spy Chief, FBI & CIA Director Gets 5-Year in Prison
- Here's the NSA Agent Who Inexplicably Exposed Critical Secrets | WIRED
- After Criticism, US Defense Department Will Implement New Encryption Standards Next Year
- Judge who once ruled against NSA metadata program tosses lawsuit | Ars Technica
- NSA breach spills over 100GB of top secret data - CNET
- Classified Pentagon data leaked on the public cloud - BBC News
- NSA leak exposes Red Disk, the Army's failed intelligence system | ZDNet
- Misconfigured Amazon S3 Buckets Exposed US Military’s Social Media Spying Campaign
- Hero or Villain? NSA Moderates Its Stance on Snowden
- 15-Year-Old Schoolboy Posed as CIA Chief to Hack Highly Sensitive Information
- FBI Bias: Trump's Criticism Justified -- Sometimes | National Review
- Leaked NSA Exploits Modified To Attack Every Windows Version Since 2000
- Leaked memo suggest NSA and US Army compromised Tor, I2P, VPNs and want to unmask Monero usersSecurity Affairs
- NSA sent coded messages through Twitter
- Personal Data of 21,426 US Marine Force Reserve Personnel Leaked
- Leaked NSA Dump Also Contains Tools Agency Used to Track Other Hackers
- FBI paid at least $1.3M for zero-day to get into San Bernardino iPhone | Ars Technica
- My Take on FBI’s “Alternative” Method – Zdziarski's Blog of Things
NATO_Cyber_forces
Russians_Angencies-Linked_groups
Grey_Energy-Black_Energy_Groups
- GreyEnergy: New malware targeting energy sector with espionage
- How Russian Spies Infiltrated Hotel Wi-Fi to Hack Their Victims Up Close | WIRED
- Russia GRU claims: UK points finger at Kremlin's military intelligence - BBC News
- Russia’s Elite Fancy Bear Hackers Have a Clever New Trick | WIRED
APT28
- apt28 hacker group at DuckDuckGo
- Russian Fancy Bear hackers' UK link revealed - BBC News
- Kaspersky: NSA Worker's Computer Was Already Infected With Malware
- Kaspersky defends its role in NSA breach - BBC News
- UK cyber-defence chief accuses Russia of hack attacks - BBC News
- NSA Hacked and Spied on Huawei, Snowden Documents Say
- Clock ticking down on NSA surveillance powers | TheHill
- Russian intelligence reportedly breached the NSA in 2015, stealing cybersecurity strategy | TechCrunch
- Russia meddled on Twitter after UK terror attacks, study says - BBC News
- Russians Found One Use for Bitcoin: Hacking the 2016 US Election | WIRED
- Russian Hackers Kept DNC Backdoor Longer Than Anyone Knew
Chinese_Agencies-Linked_groups
- The Mysterious Return of Years-Old APT1 Malware
- Chinese surveillance chips found in servers used by US technology giants: Report
- Why Supply Chain Hacks Are a Cybersecurity Worse Case Scenario | WIRED
- Chinese Spying Chips Found Hidden On Servers Used By US Companies
- Github Attack Perpetrated by China's Great Cannon Traffic Injection Tool | Threatpost | The first stop for security news
- Is Your DJI Drone a Chinese Spy? Leaked DHS Memo Suggests
- Chinese hackers go after think tanks in wave of more surgical strikes | Ars Technica
- Chinese hackers stole 614 gigabytes of US Navy's anti-ship missile data
- La guerre sous-marine : la Chine aurait emporté un trésor inestimable, en piratant le réseau privé d'un entrepreneur de la Navy
- Chinese hackers attack National Data Center using watering hole attack
UK_Agencies-Linked_groups
- UK war-games cyber attack on Moscow | News | The Sunday Times
- GCHQ cyber-spies 'over-achieved' say MPs - BBC News
Iranian_Angencies-Linked_groups
- Iran's New Facebook Trolls Are Using Russia's Playbook | WIRED
Copy_Kittens
- Experts Unveil Cyber Espionage Attacks by CopyKittens Hackers
APT33
- APT33: Researchers Expose Iranian Hacking Group Linked to Destructive Malware
- The Iran Nuclear Deal Unraveling Raises Fears of Cyberattacks | WIRED
- DOJ Indicts 9 Iranians For Brazen University Cyberattacks | WIRED
- Iranian & Russian Networks Attacked Using Cisco's CVE-2018-0171 Vulnerability
Palestinian_Agencies-Linked_Groups
- Hamas hacked smartphones of over 100 IDF soldiers
- Gaza Cybergang Returns With New Attacks On Palestinian Authority
Israeli_Agencies-Linked_groups
- NSO Group - Wikipedia
- Ex-employee stole secrets of Israeli spyware firm for dark web deals
- Israel Hacked Kaspersky, Caught Russian Spies Hacking American Spies, But...
North_Korean_Agencies-Linked_groups
- U.S. Charges North Korean Spy Over WannaCry and Sony Pictures Hack
- DoJ Charges North Korean Hacker for Sony, WannaCry, and More | WIRED
Lazarus_Group
- Lazarus group conducting malware attacks to steal Bitcoins
- Lazarus Group is back, targeting Banks & Bitcoin users with phishing scam
- Phishing alert: North Korea's hacking attacks shows your email is still the weakest link | ZDNet
- North Korea Hit By Konni and Inexsmar Malware After Missile Tests
- Trojan malware attacks by North Korean hackers are attempting to steal Bitcoin | ZDNet
Lebanese_Angencies-Linked_groups
Dark_Carakal
- Researchers Uncover Government-Sponsored Mobile Hacking Group Operating Since 2012
- EFF and Lookout Uncover New Malware Espionage Campaign Infecting Thousands Around the World | Electronic Frontier Foundation
- Dark Caracal APT - Lebanese intelligence is spying on targets for yearsSecurity Affairs
Canadian_Agencies-Linked_groups
- Canadian spy agency releases its top anti-malware tool as free software. / Boing Boing
German_Angencies-Linked_Groups
- German spy agency warns of Chinese LinkedIn espionage - BBC News
- The Dutch intelligence service AIVD 'hacked' Russian Cozy Bear systems for yearsSecurity Affairs
- Sweden Accidentally Leaks Personal Details of Nearly All Citizens
- Not Just Criminals, But Governments Were Also Using MS Word 0-Day Exploit
- Cyberwarfare - Wikipedia
- Cyberwar: Hacker vs. Hacker « Null Byte :: WonderHowTo
- Can We Hack the Hackers? « Null Byte :: WonderHowTo
- U.S. Government issues alerts about malware and IP addresses linked to North Korean cyber attacks – TechCrunch
- Cloud storage for password managers – are you for or against? – Naked Security
- Wikileaks Unveils Project Protego: CIA's Secret Missile Control System
- Hackers steal restricted information on F-35 fighter, JDAM, P-8 and C-130 – Naked Security
- Spy Tactics « Null Byte :: WonderHowTo
- Stray Wi-Fi signals could let spies see inside closed rooms | Science | AAAS
- AI and Quantum Computers Are Our Best Weapons Against Cyber Criminals
- Anonymous Muslim Group Confusing ISIS with Porn and Fake News
- Exclusive: Tracing ISIS’ Weapons Supply Chain—Back to the US | WIRED
- The secret to being a great spy agency in the 21st century: Incubating startups - TechRepublic
- Defending against cyberwar: How the cybersecurity elite are working to prevent a digital apocalypse - TechRepublic
- Quelles sont les cybermenaces qu'il faut le plus surveiller en 2018 ? Le MIT Technology Review nous donne ses prédictions
- Six Cyber Threats to Really Worry About in 2018 - MIT Technology Review
- Strava’s Global Heat Map Exposes User Locations Including Military Bases
- Fitness Tracking App Found Exposing Secret US Military Locations Around The World
- Trump infrastructure rush risks cybersecurity disaster - Axios
- China’s plan to use artificial intelligence to boost the thinking skills of nuclear submarine commanders | South China Morning Post
- AI is the new battleground in geopolitics - Axios
- Vladimir Putin’s Nuclear-Powered Cruise Missile Is ‘Batshit Crazy’ - Motherboard
- White House quickly improves email security after report - Axios
- trum-kim-jong-un-direct-number-bad-idea
- Trump and Kim USB fan raises cyber-security alert - BBC News
- How NATO Defends Against the Cyberattacks | WIRED
- The Bleak State of Federal Government Cybersecurity | WIRED
- How a Former US Spy Chief Became Trump’s Fiercest Critic | WIRED
- In time for hacking season, the US has no cybersecurity coordinator
- iran-nuclear-deal-cyberattacks
- Cyberwar: Greek & Turkish hackers target each other's media outlets
- Russian hackers sent death threats to US army wives posing as ISIS: Report
- Israeli Teen Accused of Running Bomb Threat Service Against Jewish Community Centers On Dark Web
- Fake five-star reviews being bought and sold online - BBC News
- Cyber-Attacks on US Critical Infrastructure Linked to Cisco Switch Flaw
- "Don’t Mess With Our Elections": Vigilante Hackers Strike Russia, Iran - Motherboard
- crypto-war-clear-encryption
- Android malware on Play Store targeting Palestinians on Facebook
- The Air Force Is Already Betting on SpaceX's Brand-New Falcon Heavy | WIRED
- The Pentagon Is Building a Dream Team of Tech-Savvy Soldiers | WIRED
- UK launched cyber-attack on Islamic State - BBC News
- New cyber weapons are here and no one is prepared, experts say
- Hacker Puts Airport's Security System Access On Dark Web Sale For Just $10
- Stolen sensitive drone files sold on dark web - BBC News
- Hacker Sold Stolen U.S. Military Drone Documents On Dark Web For Just $200
- Hacker selling classified information on MQ-9 Reaper Drone on dark web
- Online trolls and fake accounts poison Arab social media - BBC News
- Why It's So Hard to Make Nuclear Weapons
- How Did Radiation Affect the 'Liquidators' of the Chernobyl Nuclear Meltdown?
- Cyberattack - cyber warfare
- Cyberterrorism - Wikipedia
Forensics
- Android forensics study group · AnarchoTechNYC/meta Wiki
- anti forensic tool - Google Search
- Windows Memory Forensics: Close to Release | Cerbero Blog
- Kali Forensics « Null Byte :: WonderHowTo
- ForensicsWiki
- An Introduction to Computer Forensics
- GitHub - Flo354/Androick
- Breach detection with Linux filesystem forensics | Opensource.com
- Forensics « Null Byte :: WonderHowTo
- Top 7 Most Popular and Best Cyber Forensics Tools
Reverse_Engineering-Software_Cracking
Theory_and_Fundamental_Assembly_Dissassembly_Techniques
RE4B
- GitHub - dennis714/RE-for-beginners: "Reverse Engineering for Beginners" free book
- "Reverse Engineering for Beginners" free book
Executable_File_Formats
On_ELF_Format
- Executable and Linkable Format 101 - Part 1 Sections and Segments - Intezer
- x86 - What is PLT/GOT? - Reverse Engineering Stack Exchange
- The ELF Object File Format by Dissection | Linux Journal
- Technovelty - PLT and GOT - the key to code sharing and dynamic libraries - linking
- DWARF - Wikipedia
- The 101 of ELF files on Linux: Understanding and Analysis - Linux Audit
- ELF Sections & Segments and Linux VMA Mappings | nairobi-embedded
- linux - What's the difference of section and segment in ELF file format - Stack Overflow
- The ELF format - how programs look from the inside - Christian Aichinger's thoughts
- How to determine endianness of an object file in ELF format ? LSB ELF header-- Stack Overflow
- ELF Hello World Tutorial - Ciro Santilli
- How can I examine contents of a data section of an ELF file on Linux? - Stack Overflow
- Understanding the ELF – James Fisher – Medium
- Linux: Understanding the Memory Layout of Linux Executables · GitHub
- ELF Format - OSDev Wiki
On_Mach-O_Format
On_PE_Format
- Portable Executable - Wikipedia
Compatibility_Layers
- Wine (software) - Wikipedia
- Compatibility layer - Wikipedia
- Windows Subsystem for Linux - Wikipedia
- mono vs wine - Recherche Google
- Difference between Wine and Mono - Conditions for a binary to run on a host system - Ask Ubuntu
- Are there any advantage using Wine over VM to run Windows programs? (or Vice Versa) - Ask Ubuntu
- Wine (or POL) vs VirtualBox | Peterborough Linux User Group
- How is Windows Subsystem for Linux different from running Linux on Windows in a VM? - Quora
- virtual machine vs compatibility layer - Recherche Google
- Comparison of executable file formats - Wikipedia
- Why do we need a format for binary executable files - Software Engineering Stack Exchange
- pics/README.md at master · corkami/pics · GitHub
- iPhone cpu architecture vs android cpu architecture - Google Search
- mach-o vs elf - Google Search
- How does the Mach-O format differ from the ELF format? - Quora
- what architecture iphone cpu have at DuckDuckGo
- why does android use arm at DuckDuckGo
- windows - PE and ELF binary code differences - Stack Overflow
- Can I run a Windows .exe file on Linux? - Run PE binary on linux - Super User
- Why won't windows exe's work on Linux? - Run PE binary on linux - Super User
- LIEF - Library to Instrument Executable Formats
- Executable - Wikipedia
Understanding_The_Linking-Loading-Executing_Processes
- Object file - Wikipedia
- Linker (computing) - Wikipedia
- Loader (computing) - execve system call handler - program entry point _start
- Dynamic loading - Wikipedia
- Dynamic/Runtime linker - ld.so - late linking
- Library (computing) - locating libraries at runtime - Wikipedia
- Direct binding - Wikipedia
- Late binding - dynamic binding, or dynamic linkage - runtime - vs early/static binding - virtual keyword C++ function, virtual table vtable
- Static library - Wikipedia
- Dynamic-link library - Wikipedia
- DLL Hell - Wikipedia
- prelink - Wikipedia
- gold (linker) - Wikipedia
- GNU linker - Wikipedia
- Relocation (computing) - relocatable code - PIC position independant code - linker, loader - Donald Knuth's MIX architecture and MIXAL assembly language - table, procedure, segmentation - far pointers
- c - When a binary file runs, does it copy its entire binary data into memory at once? Could I change that? - Loading and execution of program in Linux -Stack Overflow
- Understanding ld-linux.so.2
- Program Loaders in Linux and Windows - loader vs ld vs ld.so - Global Offset Table -
- Static and Dynamic Libraries - Nick Desaulniers
- Object Files and Symbols - Nick Desaulniers
- Shared Libraries: Windows vs Linux method - Stack Overflow
- Airs – Ian Lance Taylor » Linkers part 1
- linker - difference between dynamic loading and dynamic linking? - Stack Overflow
- What is the difference between static and dynamic linking? - Quora
- c++ - Static linking vs dynamic linking - Stack Overflow
- linux - What is / does ld.so.preload do? - Super User
- Linker and Libraries Guide
- Internal and External Linkage in C++ – Peter Goldsborough
- Analyzing the Linker Map file with a little help from the ELF and the DWARF - Govind Mukundan
- The detail of compiling, linking, assembling and loading the C program image of process (binary/executable) into memory
- The compiler, assembler, linker, loader and process address space tutorial - hacking the process of building programs using C language: notes and illustrations
- What is compiler, linker, loader? - Stack Overflow
- loader vs linker at DuckDuckGo
- Difference Between Linker and Loader (with Comparison Chart) - Tech Differences
- process - Memory Addresses: Linker Vs. Loader - Stack Overflow
- Position-independent code - position-independent code (PIC) or position-independent executable (PIE)
- linker - What is the -fPIE option for position-independent executables in gcc and ld? - Stack Overflow
- PIC, PIE and Sanitizers · Mathieu Ropert
- about ELF – PIE, PIC and else | Position-Independant Executable - Code - CodyWu's Blog
- The real power of Linux executables – Execution process broken down - Own your bits
- Libraries: Static or shared?
- Static vs Dynamic libraries - Andrew Birnberg - Medium
- c - GCC linking libc static and some other library dynamically, revisited? definitive explanation standard glibc handling
- C++ Libraries: Linking and Compiling - slothparadise
- GCC and Make - A Tutorial on how to compile, link and build C/C++ applications - -I, -L, -l arguments
- What is the purpose of the '/etc/ld.so.cache' file on Linux Systems? - dynamic/runtime linker, linking process - ldconfig
- rpath - GNU ld.so vs ld - dynamic/runtime linker
- compiling - Where do executables look for shared objects at runtime? definitive - dynamic/runtime linkers - LD_LIBRARY_PATH, rpath, /etc/ld.so.conf - default linking directories
- Definitive Shared Libraries Guide On Linux - LD_LIBRARY_PATH, LD_DEBUG
- linux - Relationship between ldconfig and ld.so.cache - dpkg and apt triggers to rebuild the binary ld.so.cache - dynamic/runtime linker
- Link time - Wikipedia
- Dynamic program analysis - Wikipedia
- Static program analysis - Wikipedia
- www.kutub.info_4731.pdf
- Reverse Engineering and Function Calling by Address - CodeProject
- Difference between: Opcode, byte code, mnemonics, machine code and assembly - Stack Overflow
- How to Reverse Engineer Software Easily? - Stack Overflow
- HT Editor
- .net - What is the difference between native code, machine code and assembly code? - Stack Overflow
- Reverse Engineering Basics - YouTube
- Reversing Tools
- The Reversing Process : Reverse Engineering For Beginners - Develope IT
- What is Reverse Engineering and Software Reverse Engineering? - Reverse Engineering for Beginners
- Reversing Applications - Reverse Engineering For Beginners - Develope IT
- Reversing in Software Development - Reverse engineering for beginners
- Low-Level Software - Reverse Engineering for Beginners
- Introduction to reverse engineering and Assembly. | KaKaRoTo's Blog
- FinSpy VM Part 2: VM Analysis and Bytecode Disassembly — Möbius Strip Reverse Engineering
- Reverse Engineering Training — Möbius Strip Reverse Engineering
- Research — Möbius Strip Reverse Engineering
- Best of Reverse Engineering - Hakin9 - IT Security Magazine
- Understanding !PTE , Part 1: Let’s get physical – Ntdebugging Blog
- how recursive function works at the assembly level at DuckDuckGo
- understanding recursive calls on the stack at DuckDuckGo
- assembly - How calls work in x86 - Reverse Engineering Stack Exchange
- disassembly - How to extract functions from one executable to include/link in another - Reverse Engineering Stack Exchange
Cracking_Encryption_Obfuscation_Packing
How_To_Use_Radare2_And_Other_Tools
IDA_Pro
- Binary Patching. The Brute Force of Reverse Engineering with IDA and Hopper (And a Hex Editor). « Null Byte :: WonderHowTo
- Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 6 (Using IDA Pro) « Null Byte :: WonderHowTo
- The Basics of IDA Pro
- Applied Reverse Engineering with IDA Pro
- IDA Pro Configuration Options
- Reverse Engineering Necurs (Part 4 – IDA Pro’s Python API) – UT Austin Information Security Office
- GitHub - nologic/idaref: IDA Pro Instruction Reference Plugin
- GitHub - onethawt/idaplugins-list: A list of IDA Plugins
- Hex-Rays Decompiler: Manual
- What is the Best resource to learn IDA pro for beginners? - Quora
- IDA Tutorials: General Purpose Tutorials
- IDA Debugger: Overview
- IDA Tutorials: Debugging Tutorials
- IDA Tutorials: Remote Debugging
- IDA Tutorials: Tracing
- ida - How can I make EXE file of the modified copy? - Stack Overflow
- patch - IDA Pro and editing executables - Stack Overflow
- patch reversing - How do I change a string correctly in IDA Pro? PIC Position Independant Code related - Reverse Engineering Stack Exchange
- debugging_windbg.pdf
- IDA Debugger: Win32 To Win64
- x64 - IDA cannot launch debugger for 64-bit exe files - Reverse Engineering Stack Exchange
- debugging - DEbug x64 application using IDA PRO 6.1 - Stack Overflow
- debugging - IDA PRO + Windows 10 + WinDbg - Reverse Engineering Stack Exchange
- How can I make IDA see a string reference? - Reverse Engineering Stack Exchange
gdb
- How can I make gdb save the command history? - Stack Overflow
- gdb not giving the complete description of the error - Stack Overflow
- Using GDB to Develop Exploits - A Basic Run Through
- gdb history at DuckDuckGo
- terminal - How to highlight and color gdb output during interactive debugging? - Stack Overflow
- Linux Tutorial - GNU GDB Debugger Command Cheat Sheet - definitive
- Gdbinit/gdbinit at master · gdbinit/Gdbinit · GitHub
- Debugging with GDB
- Beej's Quick Guide to GDB - definitive - intro - Breakpoints Stepping Around Examining Variables Misc Stuff Stack Manipulation Additional Stepping Methods Jumping to an Arbitrary Section of Code Changing Variables and Values at Runtime Hardware Watchpoints Attach to a Running Process Using Coredumps for Postmortem Analysis Window Functions Display Registers and Assembly Writing a Front-End Quick Reference Cheat Sheet
- GDB Command Reference - Index page
- PEDA - Python Exploit Development Assistance For GDB - KitPloit - PenTest Tools for your Security Arsenal ☣
- lldb vs gdb at DuckDuckGo
- Debugging with GDB - Tracepoints
- How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? definitive GDB tutorial, insights and tricks - .gdbinit - Reverse Engineering Stack Exchange
- GNU Debugger - gdb - remote debugging, embedded system, through serial device or TCP/IP communication - kgdb linux kernel debugging
- Chapter 20. Debugging a Running Application - attaching - gdbserver - Red Hat Customer Portal
- GDB – Debugging stripped binaries | Félix Abecassis
- gdbserver - remote debugging - Wikipedia
- Breakpoints, watchpoints, and catchpoints - GDB
- A Quickstart Guide to Debugging C Programs with gdb
- Debugging with GDB - Set Breakpoints
- How to point GDB to your sources - definitive - list subcommand - debug sections in DWARF format
- Hardware Breakpoint (or watchpoint) usage in Linux Kernel
- Debugging Information in Separate Files - .debug file
- Debugging with GDB: Separate Debug Files - .debug files
- linux - How to terminate gdbserver? - Stack Overflow
- BuildingCrossGDBandGDBserver - GDB Wiki
- embedded linux - Need cross gdb for device - definitive
- How to Debug Programs on Remote Server using GDBServer Example
- Remote Cross-Platform Debugging with GDB - gdb server
- Remote Debugging with GDB - gdbserver - definitive exhaustive doc
- DEFINTIVE - Debugging with GDB - official doc - stack frames examination, sources
- Cross Arch Remote Debugging with gdb and gdbserver
- Cross Debugging with GDB: Embedded Linux - YouTube
- Debugging with GDB - Specifying a Debugging Target - gdbserver
- Debugging with GDB: Top
radare2
- Radare2 Book
- radare
- radare2/doc at master · radare/radare2 · GitHub
- Radare Basics - MOVEAX.ME
- Radare2 - Radare2 - a framework for reverse engineering - radare2-workshop-slides.pdf
- patch - Binary patching using radare2 in debug mode - Reverse Engineering Stack Exchange
- Index of /2015/radare2-workshop
- How to Reverse Engineering with Radare2 (A Quick Introduction) « Null Byte :: WonderHowTo
- Reverse Engineering With Radare2, Part 1 | Sam Symons
- Reverse engineering a Gameboy ROM with radare2 – Megabeets
- A journey into Radare 2 – Part 1: Simple crackme – Megabeets
- A journey into Radare 2 – Part 2: Exploitation – Megabeets
- Reversing a Self-Modifying Binary with radare2 – Megabeets
- Reverse Engineering Using Radare2 – Jacob Pimental – Medium
- Reverse Engineering With Radare2 — Part 2 – Jacob Pimental – Medium
- Debugging Using Radare2… and Windows! – Jacob Pimental – Medium
- Defeating ioli with radare2
- Introduction To Reverse Engineering With Radare2 - YouTube
- pancake - Reversing with Radare2 - YouTube
- (2) radare demystified (33c3) - YouTube
- GitHub - dukebarman/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2
- reverse engineering - entry0 meaning in radare2 - Stack Overflow
- How to display .text section of a PE in radare2? - Reverse Engineering Stack Exchange
- Reverse Engineering With Radare - Fundamentals and Basics • tracing bytes
- Reverse Engineering With Radare - Binary internals • tracing bytes
- Radare2: An Introduction to Visual Mode - MOVEAX.ME
- yet another radare2 cheatsheet.md · GitHub
- radare2 r2-cheatsheet.pdf
- radare2/intro.md at master · radare/radare2 · GitHub
- Reverse Engineering With Radare2 – Intro – Insinuator.net
- Getting started with Radare2 - cheat sheet
- Tomas_Antecky-Disassembling_with_radare2.pdf
- Radare2 documentation wiki - r2wiki
- Radare2 defnitive tips and cheatsheet - r2wiki
- radare2 cheat sheet - .rc config file - GitHub
- Radare2 Cheatsheet – add/remove comment
- Radare2 cheat Sheet - { Anas Aboureada }
- Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan
- Cheatsheet - r2wiki - definitive radare2 cheatsheet
- r2con2017 - Hidden Gems in r2land by pancake - radare2
- Remote GDB · Radare2 Book - gdbserver
- How to debug with remote binaries radare2? - Reverse Engineering Stack Exchange
- r2avtokyo-en.pdf
- disassemble arm code radare2 - Recherche Google
Tools_Comparison
- Comparison sheet Radare2 vs IDA Pro vs GDB vs WinDbg · Radare2 Book
- Difference between nm and objdump - Stack Overflow
- Unfair comparison between r2, IDA Pro and Hopper.
- A (completely unfair) comparison between radare2, IDA Pro and Hopper : ReverseEngineering
- immunitydbg vs ollydbg at DuckDuckGo
- debuggers - What is the linux equivalent to OllyDbg and Ida Pro? - Reverse Engineering Stack Exchange
- linux - Differences between objdump and xxd - Stack Overflow
- linux - readelf vs. objdump: why are both needed - Stack Overflow
- utilities - Can hd and od replace each other? - Unix & Linux Stack Exchange
- tools - Is there any disassembler to rival IDA Pro? - Reverse Engineering Stack Exchange
- Panopticon: A libre, cross platform disassembler for reverse engineering | Hacker News
- Top 10 Essential CTF Tools for Solving Reversing Challenges - definitive list
- Intro to Debugging x86-64 Assembly - Nick Desaulniers
- How to view symbols in object files? - Stack Overflow
- Pip3Line - The Swiss Army Knife Of Byte Manipulation - KitPloit - PenTest Tools for your Security Arsenal ☣
- Reverse Engineering Tools
- Avast launches open-source decompiler for machine code - TechSpot
- Merry Xmas, fellow code nerds: Avast open-sources decompiler • The Register
- bharadwaj.machiraju
- RPISEC IOLI Challenges Solutions - Part 0x00 | Ring 0x00
- Enigma Group - Solutions to IOLI crackmes - challenges | hvoid code
- GitHub - lgeek/ioli_crackme_dbm_solution: Solving IOLI-crackme with Dynamic Binary Modification
- MOVEAX.ME -
- Reversing IOLI Crackme Challenges - Irken Kitties
- ltrace - Wikipedia
- Debugging Library (Linker and Libraries Guide)
- od (Unix) - Wikipedia
- Binary diffing - radiff2 · The Official Radare Blog
- diff - How do I compare binary files in Linux? - Super User
- masm - Microsoft Macro Assembler - Wikipedia
- DarunGrim: A Patch Analysis and Binary Diffing Tool
- ARM disassembly - Stack Overflow
- linux - Using objdump for ARM architecture: Disassembling to ARM - Stack Overflow
- binary ninja at DuckDuckGo
- capstone reverse engineering at DuckDuckGo
- ollydbg linux - Recherche Google
- Netwide Assembler - nasm - Wikipedia
- google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=4&ved=2ahUKEwit246QirvfAhUHgM4BHVC3DL0QFjADegQIBRAB&url=https%3A%2F%2Fwww.cs.swarthmore.edu%2F~newhall%2Funixhelp%2Fbinaryfiles.html&usg=AOvVaw0H5DQVcI9aFsaEdsTSAPYU
- emacs - How can I compare two files similar to vim's vimdiff? - Stack Overflow
- vimdiff - How do I use vim as a diff tool? - Vi and Vim Stack Exchange
- disassembly - big-endian && little -endian? - objdump manual section about endiannes Stack Overflow
- GitHub - ynh/cpp-to-assembly: C/C++ to assembly visualizer
- Compiler Explorer - definitive online multi architecture assembler
- linux - How to print only the hex values from hexdump without line numbers or ASCII table? hexdump - xxd -p - Stack Overflow
- CTF-writeups/0x00.md at master · sure-fire/CTF-writeups · GitHub
- IOLI crackme Writeup | Firmy’s blog
- Showcases – Capstone – The Ultimate Disassembler - definitive list of disassemblers, debuggers - reverse engineering tools
- Breakpoint - 1 Machine breakpoints 2 Non-interactive breakpoints 3 Interactive breakpoints 4 Breakpoint conditions 5 Inspection tools 6 Implementations 6.1 Hardware 6.2 Software
- disassembler.io - definitive online tool
Bypassing_Software_Licensing_Systems
- How to Crack Software - Method 2 (Intermodular Calls) - YouTube
- The Hacks Behind Cracking, Part 1: How to Bypass Software Registration « Null Byte :: WonderHowTo
- reset trial version lifetime at DuckDuckGo
- How To Hack or Reset Trial Period of Any Software and Use Them Lifetime in PC
- How to Reset the Trial Period of Software to work it Lifetime? ~ Digital Tips n Tricks
- Using API Monitor to crack copy protected software | rohitab.com
- Software Cracking Security Analysis - software_cracking.pdf
Building_Licensing_Systems
- Implementing a Partial Serial Number Verification System in Delphi | Brandon Staggs .Com
- Implementation of the Licensing System for a Software Product - CodeProject
- A Ready To Use Software Licensing Solution in C# - CodeProject
- How to Generate (and Validate) CD-Keys for your Software - CodeProject
- License Key Generation - CodeProject
- security - How are Software License Keys generated? - Stack Overflow
-
Encryption_Primitives_Identification_In_Binary_Code
- tools - Determine Encryption Algorithm from binary code - Reverse Engineering Stack Exchange
- GitHub - felixgr/kerckhoffs: Automatic Identification of Cryptographic Primitives in Software - cryptosystem/encryption algorithms identification in software - cryptanalysis
- Phoenix Testing Facility: IDAscope update: Crypto Identification
- FindCrypt – Hex Blog
- FindCrypt2 – Hex Blog
Obfuscation-Packing-VM_Protections
- Obfuscation (software) - Wikipedia
- Security through obscurity - Wikipedia
- RPISEC - Obfuscation - syllabus.pdf
- Obfuscation : protection du code source contre le reverse engineering
- La protection des programmes contre le reverse engineering
- DEFCON 17: Binary Obfuscation from the Top-Down: Obfuscating Executables Without Writing Assembly - YouTube
- Code Obfuscation Techniques for Software Protection - thesis-199.pdf
- https://www.exploit-db.com/docs/english/12977-applied-binary-code-obfuscation.pdf
- Defcon 18 - Trolling reverse engineers with math - frank - YouTube
- [Advanced Programming Concepts] Obfuscation - YouTube
- Reverse Engineering a JavaScript Obfuscated Dropper
- How do I implement code obfuscation for native code? - Software Engineering Stack Exchange
- Tutorial for Building and Reverse Engineering Simple Virtual Machine Protection
- Using reverse engineering techniques to see how a common malware packer works
- dream of a reverse engineer: Unpacking Custom Packers
- Unpacking, Reversing, Patching
- Explained: Packer, Crypter, and Protector - Malwarebytes Labs | Malwarebytes Labs
- Deobfuscating xor’ed strings – Hex Blog
- (2) Making a Simple Deobfuscator - YouTube
- Encrypted Code Reverse Engineering: Bypassing Obfuscation
- How to obfuscate string constants? - Stack Overflow
- What are the advantages of obfuscating release code? - Software Engineering Stack Exchange
- techniques for obscuring sensitive strings in C++ - Stack Overflow
- How can I obfuscate a string into a C++ binary? - Stack Overflow
- How to hide a string in binary code? - Stack Overflow
- http://www.cs.ucsb.edu/~vigna/publications/2004_kruegel_robertson_valeur_vigna_USENIX04.pdf
- Obfuscation Resilient Binary Code Reuse through
Trace-oriented Programming
- Hide Strings In Your Executable
- Binary obfuscation - String obfuscating in C
- Does a binary executable have to have some critical plain-text components? - Information Security Stack Exchange
- Strings Obfuscation System - CodeProject
- http://www.wisdom.weizmann.ac.il/~naor/PAPERS/tracing_traitors.pdf Encryption, tracing, watermarking.
- Encrypted Code Reverse Engineering: Bypassing Obfuscation
- The case for code obfuscation? - Software Engineering Stack Exchange
- binary_obfuscation from the top down - defcon
- How to hide a string in binary code? - Stack Overflow
- https://repo.zenk-security.com/Reversing%20.%20cracking/Multi-stage%20Binary%20Code%20Obfuscation%20using%20Improved%20Virtual%20Machine.pdf
- dotfuscator c++ - Google Search
- Source code obfuscation
- GitHub - 0xd4d/de4dot: .NET deobfuscator and unpacker.
Malware_Analysis
- Deep Dive into a Custom Malware Packer
- The road to Reverse Engineering Malware – Pablo Ramos – Medium
- Unpacking a malware with libPeConv (Pykspa case study) | hasherezade's 1001 nights
- GitHub - RPISEC/Malware: Course materials for Malware Analysis by RPISEC
- GitHub - rshipp/awesome-malware-analysis: A curated list of awesome malware analysis tools and resources.
- Red Alert v2.0: Misadventures in Reversing Android Bot Malware
- Reverse Engineering Necurs (Part 3 – Patching) – UT Austin Information Security Office
- Reverse Engineering – Malware Analysis - UT Austin Information Security Office
- Decrypting APT33's Dropshot Malware with Radare2 and Cutter – Part 1 – Megabeets
- https://www.virustotal.com/#/home/upload
- http://security.cs.rpi.edu/courses/malware-spring2013/
- Analyzing malicious documents (W32) - eForensics
- Code segment encryption - Code Armoring - Malware Analysis - Sevagas
Movies-Video_Games_Cracking
- hack console game turn it into pc game - Google Search
- Hack For Security: Google Dork For Finding E books
- How to Nab Free eBooks Using Google « Null Byte :: WonderHowTo
- Motherboard Hacking Livestream: Cracking MMORPGs - Motherboard
- hack console game turn it into pc game - Google Search
- vmprotect vs denuvo - Google Search
- convert console games iso into pc games at DuckDuckGo
- 6 Answers - Can I convert a console physical copy of a game (PS4) into a PC copy?
- Turning a PS2 game into a bootable .EXE file and other weekly news. | Unpause And Pwn
- Can you convert ps2 games to PC game
- How To Convert Any Computer Into A Gaming Console With Lakka Linux Distro
- Hack Like a Pro: How to Anonymously Torrent Files with Tribler « Null Byte :: WonderHowTo
- How does YiFY get all these Bluray movies early? : torrents
- How Do Movies Leak Before They Come Out on DVD and Blu-Ray?
- why is it not possible to crack hd movie before the release at DuckDuckGo
- Inmates pirated movies from computers they build with spare parts
- security The Teens Who Hacked Microsoft's Xbox Empire—And Went Too Far Author: Brendan KoernerBrendan Koerner
- how to hack movies hd before dvd release - Google Search
- Assassin’s Creed Origins “VMProtect + Denuvo” protection has been cracked | DSOGaming | The Dark Side Of Gaming
- decompilation - How do Enigma, Themida and VMProtect compare to each other? - Reverse Engineering Stack Exchange
- vmprotect reverse engineering at DuckDuckGo
- Software cracking - Wikipedia
- Crackme - Wikipedia
- Hotpatching a C Function on x86 « null program
- Binary Analysis Course – Max Kersten
- Technical Risks of Reverse Engineering and Unauthorized Code Modification - OWASP
- RH10 Moon.pdf
- Reversing Cracking - Hakin9 - IT Security Magazine
- CrackFAQ
- Difference between Data Masking and Data Obfuscation | Data Masking vs Data Obfuscation
- how-to-crack.pdf
- Index of file:///home/programmersn/Downloads/Cybersecurity-20170815T072300Z-001/Cybersecurity/Reverse_Engineering/howtocrack/
- Rp++ - Tool That Aims To Find ROP Sequences In PE/Elf/Mach-O X86/X64 Binaries - KitPloit - PenTest Tools for your Security Arsenal ☣
Cracking_Mobile_Apps
Cracking_Java-Android_Apps
Debugging_Environment-Tools
- Attacking Android Applications With Debuggers - definitive guide
- Android Reverse Engineering: Debugging Smali in Smalidea in Android studio| definitive guide - ddms monitor launch - Alexander Molochko
- AndroidSDK - adb debugging on linux - Community Help Wiki
- Run apps on a hardware device - adb debugging | Android Developers
- Android Debug Bridge (adb) | official guide - adb commands reference - Android Developers
- Setting up your System to Detect your Android Device with adb
- Setting up an android Device for Development - adb - android devices vendors id - vendorID
- Apktool - Documentation
- Smalidea plugin in Android Studio - Stack Overflow
- smalidea · JesusFreke/smali Wiki - android application apk disassembling and debugging - definitive guide
- Java decompiler online
Dalvik_Bytecode-Smali_Syntax
- Registers · JesusFreke/smali Wiki
- smali/HelloWorld.smali at master · JesusFreke/smali
- TypesMethodsAndFields · JesusFreke/smali Wiki
- Dalvik opcodes
- android cracking: example.smali
- android cracking: example-structures.smali
Native_Android-ARM_Reversing
- Native Android Reverse Engineering Tutorial#1: Patching/Modifying String within Native Android App ~ Shubham Aher | Blog
- disassembly - How do I reverse engineer .so files found in android APKs? - Reverse Engineering Stack Exchange
- Reverse Engineering Android:Disassembly & Code Injection - static evasion heuristic, smali syntax
- Studying APK reverse engineering by breaking the anonymity of BlindSpot app
- Security tips | Android Developers
- How Android Apps are Built and Run · dogriffiths/HeadFirstAndroid Wiki
- Practice of Android Reverse Engineering
- Android Deobfuscation Tools and Techniques
- android cracking: way of the android cracker
- android cracking: way of the android cracker 1
- Various Methods to Disassemble DEX Files - ForensicsWiki
- android - What does OAT mean? - Stack Overflow
- android - Difference between dexopt and dex2oat? - Stack Overflow
- Android Hacking and Security, Part 1: Exploiting and Securing Application Components
- Android for Pentesters: Application Reversing - YouTube
- java - Decompile an APK, modify it and then recompile it - Stack Overflow
- Projects/OWASP Androick Project - OWASP
- GitHub - amoulu/TinySmaliEmulator: A very minimalist smali emulator that could be used to "decrypt" obfuscated strings
- reverse engineering apk jni so - Recherche Google
- java - Android NDK possibility of decompiling native code - Stack Overflow
- GitHub - lxdvs/apk2gold: CLI tool for decompiling Android apps to Java. It does resources! It does Java! Its real easy!
- Obfuscating Android Applications using O-LLVM and the NDK
- Reverse Engineering Pre-Installed Android Apps
Cracking_iOS-OSX_Apps
- GitHub - iosre/iOSAppReverseEngineering: The world’s 1st book of very detailed iOS App reverse engineering skills :)
- A Quick Guide to Using Clutch 2.0 to Decrypt iOS Apps | Digital Forensics Tips
- Reverse Engineering Tools - iPhone Development Wiki
- ios - Library? Static? Dynamic? Or Framework? Project inside another project - Stack Overflow
- Become an iOS Hacker - How to Write Your First Exploit using Return Oriented Programming (ARM) - YouTube
- hacking-ios-on-the-run-using-cycript.pdf
- iOS apps reverse engineering - iOS_apps_reverse_engineering-SCS3_2011_Bachmann.pdf
- Microsoft Word - iOSAppReverseEngineering.docx - iOSAppReverseEngineering.pdf
- iOS_App_Hacking-AppSecUSA_2014.pdf
- IOS Application Security Testing Cheat Sheet - OWASP
- iOS_Security_iOS_10_Mar2017
- gdbinit (fG!) · GitHub
- Reverse Engineering Mac OS X
Preventing_Reverse_Engineering_of_Mobile_Apps
- Mobile app reversing and tampering | CSO Online
- OWASP/owasp-mstg: The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security testing and reverse engineering.
- Bytecode obfuscation - proguard - OWASP
- owasp-mstg/0x05j-Testing-Resiliency-Against-Reverse-Engineering.md at master · OWASP/owasp-mstg
- An Android Application Protection Scheme against DynamicReverse Engineering Attacks
- Communication and Communicating Devices: Code Protection in Android
- Les développeurs Android peuvent désormais empêcher leur application de prendre un appareil rooté en charge, par le biais de l'API SafetyNet
- Projects/OWASP Mobile Security Project -2015 Scratchpad - OWASP
- Supercar Showdown - Supercar Showdown
- ‘Hello World!’ in ARM assembly
- Reverse-Engineering/CydiaSubstrate at master · rootkiter/Reverse-Engineering · GitHub
Cracking_Hardware-Embedded-IoT
- How I Reverse Engineered and Exploited a Smart Massager
- Reverse Engineering A BLE Service To Control A Light Bulb | Hackaday
- Reverse engineering the Intel FSP… a primer guide! – Purism
- Unbox Your Phone — Part I. – taszksec – Medium
- Dummies Guide to Reverse Engineering | Hackaday
- CSCI 4974 / 6974 RPISEC Hardware Reverse Engineering
- Smart card security - from a programming languageand static analysis perspective - Leroy - pdf
- Hardware Hacking: Extracting Firmware from Atmel Microcontrollers
- [IoT Security] Introduction to Embedded Hardware Hacking - definitive tools list - Bus Pirate, which gives you the ability to connect to the UART, I2C, SPI, and JTAG communication protocols - vs Shikra vs Seggar J-link - BeagleBone Black board
Firmwares-Binary_Blobs_Reversing
- Binwalk | Penetration Testing Tools - firmware analysis tool
- unpacking Download.img firmware for alcatel mw40 - Reverse Engineering Stack Exchange
- Embedded Devices Security - Firmware Reverse Engineering
- How do I extract a copy of an unknown firmware from a hardware device? JTAG, UART, UrJTAG, OpenOCD, U-Boot, ICSP - Snarfing - ROM reader/programmer - definitive exhaustive answer - hacking tools
- Firmware analysis and file system extraction? - Reverse Engineering Stack Exchange
- Extract files from a bin firmware - binwalk - Reverse Engineering Stack Exchange
- Unable to extract IP camera firmware - binwalk -. firmware analysis, examination of an entropy plot - Reverse Engineering Stack Exchange
- DEFINITIVE - Introduction to Firmware Reversing - D-Link Camera
- Firmware security, why it matters and how you can have it - YouTube
- DEFINITIVE - Introduction to Firmware Reversing - D-Link Camera - associated to youtube video
- DEFINITIVE - Reverse engineering embedded software using Radare2 - MIPS Architecture
- Simple Firmware Reverse Engineering - dd command options
- Firmware Reverse Engineering - lzma, flashrom
- Extracting Firmware from External Memory via JTAG - YouTube
- DEFINITIVE - firmware hacking - Binwalk alternative - Reverse Engineering Stack Exchange
- Demystifying Firmware Debugging - Gears of Resistance
- Reversing and Exploiting Embedded Devices: The Software Stack (Part 1)
- GitHub - airbus-seclab/cpu_rec: Recognize cpu instructions in an arbitrary binary file - binwalk module
- Emulating Embedded Linux Devices with QEMU | Novetta
- radare2 – Firmware Security
- Firmware Security – Hastily-written news/info on the firmware security - resources
- IoT Penetration Testing Part 1 - Twelvesec
- Poking around router firmware using Binwalk - YouTube
- Binwalk Utility Helps You Analyze and Reverse-Engineer Firmware Files
- exploiting firmware binarys using a bufferoverflow - a practical tutorial — Steemit
- Hacking Embedded Devices - hardware security
- Reverse-engineering Broadcom wireless chipsets - hardware wifi hacking - WLAN
- Intro to Embedded Reverse Engineering
for PC reversers
Hardware_Drivers_Reversing
- Reverse-Engineering Drivers for Safety and Portability
- I hate software: On GPU ISAs and hacking - reverse engineering, linux kernel drivers
- windows - Reverse engineering USB peripheral driver - Reverse Engineering Stack Exchange
- Reverse engineering vendor firmware drivers for little fun and no profit [linux.conf.au 2014] - YouTube
- How Device Drivers Are Reverse Engineered - Slashdot
- Reverse Engineering A USB HID RFID Reader Writer · charlysan/pyrfidhid Wiki · GitHub
- USB Reverse Engineering: Down the rabbit hole | /dev/alias – Hack. Dev. Transcend.
- Ever wondered how device drivers are reverse engineered? | Hacker News
- USB Reverse Engineering: A Universal Guide | Hackaday
- Reverse Engineering of Binary Device Drivers with RevNIC
- Reverse Engineering & Bug Hunting on KMDF Drivers - Reverse_Engineering_and_Bug_Hunting_On_KMDF_Drivers.pdf
- Reverse Engineering USB Protocol · openrazer/openrazer Wiki · GitHub
- An IDA Pro Plugin For Windows Driver Reversing
- USB Reverse Engineering: Down the rabbit hole - By Glenn 'devalias' Grant
- Reverse Engineering: Writing a Linux driver for an unknown device - windows to linux kernel module portage - open(), close(), read(), ioctl(), mmap()
- Reverse Engineering PCI Drivers - coreboot
- Reverse engineering the Elan KTF2K touchscreen driver - Paul Kocialkowski's coding blog
- Practical Partial Hardware Reverse Engineering Analysis | SpringerLink
- (PDF) Reverse Engineering–Hardware and Software
- Hardware Reverse Engineering:Overview and Open Challenges
- Hardware Reverse Engineering 101 [1/3] - Layerone 2013 - YouTube
- Hrdaware and Firmware reverse engineering - UART, backdoors, vulnerability, IoT, embedded
- Electronics Reverse Engineering Walkthrough - Hacking the Monoprice Select Mini 3D Printer - IoT, embedded
- DEFINITIVE - Reverse Engineering Embedded ARM Devices - by pancake, radare2 author
- Tutorial: Introduction to Reverse Engineering - Mike Anderson, The PTR Group, Inc. - Hardware, IoT, embedded, electronics
- BalCCon2k16 - Travis Goodspeed - Nifty Tricks for ARM Firmware Reverse Engineering - YouTube
- learning to reverse engineer routers - reading serial flash ROMs - read only memory
- Intro to Hardware Reversing: Finding a UART and getting a shell - YouTube
- Reverse Engineering Embedded Software - an introduction Using Radare2
- Minded Security Blog: Pentesting IoT devices (Part 1: Static Analysis)
- Emulating and Exploiting Firmware binaries - Offensive IoT Exploitation series
- Modern Vulnerability Research Techniques on Embedded Systems - Breaking Bits
- Nikita Abdullin - Reverse-engineering of embedded MIPS devices. Case …
- Do not create a backdoor, use your provider’s one !
- HACKABLE SECURITY MODULES - REVERSING AND EXPLOITING A FIPS140-2 LVL 3 - HSM - FIRMWARE
- Mind Booster Noori: How to extract a dts from an Android Phone - device tree source - boot.img -
- Working with proprietary blobs | LineageOS Wiki - Android
- Reverse engineering - Wikipedia
- A Reverse Engineering Reading List | Sam Symons
- Reverse Engineering
- fdivrp/awesome-reversing: A curated list of awesome reversing resources - reverse engineering
- RPISEC · GitHub
- DEFINITIVE - Reverse Engineering Resources-Beginners to intermediate Guide/Links - definitve resources list - hypervisor based debugger - Anti-Reverse Engineering Techniques & Countermeasures - firmwares - packers, process hooking -
- DEF CON 23 - Chris Domas - Repsych: Psychological Warfare in Reverse Engineering - YouTube
Social_Engineering
Phishing
Business_Email_Compromise_Attacks
- What is a Business Email Compromise (BEC) Attack? And How Can I Stop It?
- How Business Email Compromise Attacks Work: A Detailed Case Study
- Phishing Definition, Prevention, and Examples
- How to Avoid Phishing Scams
- 6 Anti-Phishing Tips Backed by Security Experts
- Giant spambot scooped up 711 million email addresses - BBC News
- Phishing Schemes Are Using HTTPS Encrypted Sites to Seem Legit | WIRED
- spoofing vs phising at DuckDuckGo
- How to Avoid Phishing on LinkedIn
- According to TRENDMICRO Business Email Compromise (BEC) attacks could reach $ 9 billion in 2018Security Affairs
- Fourth Fappening Hacker Admits to Stealing Celebrity Pics From iCloud Accounts
- Phishing for “Access” – rvrsh3ll’s Blog
- GitHub - UndeadSec/SocialFish: Ultimate phishing tool with Ngrok integrated.
- Ultimate Phishing Tool with Ngrok Integrated: SocialFish
- Social engineering (security) - Wikipedia
- Social Engineering « Null Byte :: WonderHowTo
- Hack Like a Pro: The Ultimate Social Engineering Hack « Null Byte :: WonderHowTo
- Social Engineering Examples and techniques in Ethical Hacking
- Common Social Engineering Attack Tactics and How to Prevent Them
- phishing vs social engineering at DuckDuckGo
- How Hackers Steal Passwords using the SEToolkit
- Scammers bought Twitter ads to run verified badge phishing scam
- build wikipedia reputation for hacking - Google Search
- What is reverse social engineering? - Information Security Stack Exchange
- Social Engineering: How to Use Persuasion to Compromise a Human Target « Null Byte :: WonderHowTo
- Social Engineering - Total Guide « Null Byte :: WonderHowTo
OS-wise_attacks
Amazon_FreeRTOS_IoT_Hacking
- Critical Flaws Found in Amazon FreeRTOS IoT Operating System
Windows_attacks
- What do you think of the current Windows OS ? - Quora
- is windows 10 less vulnerable at DuckDuckGo
- WinSpy - A Windows Reverse Shell Backdoor Creator With An Automatic IP Poisener - KitPloit - PenTest Tools for your Security Arsenal ☣
- Securing your Endpoint and Identity with Windows 10 (W40) - Pentestmag
- Hacker Discloses New Windows Zero-Day Exploit On Twitter
- Unpatched Windows Flaw Lets Attackers Backdoor Systems (Updated)
- PowerShell for Hackers - Hakin9 - IT Security Magazine
- Researcher Discloses New Zero-Day Affecting All Versions of Windows
- Active Spy Campaign Exploits Unpatched Windows Zero-Day | The first stop for security news | Threatpost
- PowerShell for Hackers (W41) - Hakin9 - IT Security Magazine
- Firework - Leveraging Microsoft Workspaces in a Penetration Test - KitPloit - PenTest Tools for your Security Arsenal ☣
- Exploit Development on Windows (W38) - Pentestmag
- Recent Windows ALPC zero-day has been exploited in the wild for almost a week | ZDNet
- Windows utility used by malware in new information theft campaigns | ZDNet
- Hacker Discloses Unpatched Windows Zero-Day Vulnerability (With PoC)
Patches_Releases
- Awesome Windows Exploitation Resources
- Windows Exploitation - RPISEC - Smashing Stacks, For Fun & Credit
- Windows Registry and Log Analysis (W31) - eForensics
- Null Character Bug Lets Malware Bypass Windows 10 Anti-Malware Scan Interface
- Exploiting Format Strings in Windows | 🔐Blog of Osanda
- Userland API Monitoring and Code Injection Detection - Malware - 0x00sec - The Home of the Hacker
- Decrement Windows kernel for fun and profit | Wolf's IT-thoughts
- How Not to Encrypt a File — Courtesy of Microsoft – Robert Parks – Medium
- Creeping on Users with WMI Events: Introducing PowerLurk | Pentest Armoury
- How to Hack Windows 7 (Become Admin) « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Exploit Adobe Flash with a Corrupted Movie File to Hack Windows 7 « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Find the Latest Exploits and Vulnerabilities—Directly from Microsoft « Null Byte :: WonderHowTo
- How to Extract Windows Usernames, Passwords, Wi-Fi Keys & Other User Credentials with LaZagne « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Exploit and Gain Remote Access to PCs Running Windows XP « Null Byte :: WonderHowTo
- Key Windows 10 Anti-Malware Tech Critically Broken - ExtremeTech
- Patch Tuesday: Microsoft Releases Update to Fix 53 Vulnerabilities
- Microsoft' New Feature to Protect Windows 10 from Ransomware
- Your Windows Login Details Can Be Stolen By Hackers Without User Interaction
- It's 2017... And Windows PCs can be pwned via DNS, webpages, Office docs, fonts – and some TPM keys are fscked too • The Register
- Microsoft Patches Critical Windows DNS Client Vulnerabilities | Threatpost | The first stop for security news
- Unpatched Windows Kernel Bug Could Help Malware Hinder Detection
- Linux Subsystem on Windows 10 Allows Malware to Become Fully Undetectable
- CowerSnail — Windows Backdoor from the Creators of SambaCry Linux Malware
- How to Hack Windows: Beginner Level Part -6 - Develope IT
- Microsoft Issues Security Patches for 25 Critical Vulnerabilities
- Malware display fake BSOD to sell phony Windows anti-virus for $25
- Microsoft Issues Emergency Windows Security Update For A Critical Vulnerability
- Microsoft Issues Patches for Another Four Zero-Day Vulnerabilities
- You Can Steal Windows Login Credentials via Google Chrome and SCF Files
- Pre-Installed Password Manager On Windows 10 Lets Hackers Steal All Your Passwords
- For 8 days Windows bundled a password manager with a critical plugin flaw | Ars Technica
- thehackernews.com/2018/01/microsoft-security-patch.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
- Trois exploits de la NSA réécrits pour affecter toutes les versions de Windows lancées à partir de l'an 2000
- Hacking Windows 10: How to Break into Somebody's Computer Without a Password (Setting Up the Payload) « Null Byte :: WonderHowTo
- Sonic & Ultra signals can be used to crash Windows, Linux & hard drives
- Extracting SSH Private Keys from Windows 10 ssh-agent
- Critical Windows bug fixed today is actively being exploited to hack users – Ars Technica
- why is microsoft considered more vulnerable than other oses - Google Search
- Securing Your Endpoint and Identity in Windows 10 - PenTestMag course
- Warning: Your Windows PC Can Get Hacked by Just Visiting a Site
- malware gen win32 at DuckDuckGo
- Hackers Publish PoC of Zero-day Vulnerability in Windows on Twitter
Mac_OS_X_hacking
- The UK war-games cyberattacks that could black out Moscow — Quartz
- Apple Kernel Code Vulnerability Affected All Devices | Hackaday
- Le FBI a résolu un mystère vieux de 15 ans entourant le malware Fruitfly Mac qui était utilisé pour espionner les victimes via leur webcam ou micro
- ex-NSA Hacker Discloses macOS Mojave 10.14 Zero-Day Vulnerability
- How to Hack Mac OS X Lion Passwords « Null Byte :: WonderHowTo
- Fake Symantec Blog Caught Spreading Proton macOS Malware
- Apple Users, Beware! A Nearly-Undetectable Malware Targeting Mac Computers
- Stupid, stupid MacOS security flaw grants admin access to anyone | ZDNet
- Juuso Salonen — Breaking into the OS X keychain
- Millions of Up-to-Date Apple Macs Remain Vulnerable to EFI Firmware Hacks
- Password-theft 0-day imperils users of High Sierra and earlier macOS versions | Ars Technica
- Apple MacOS High Sierra Security Flaw Lets Anyone Get Root Access, No Password Required | WIRED
- macOS High Sierra Bug Lets Anyone Gain Root Access Without a Password
- Is Apple getting sloppy? - BBC News
- Apple's MacOS High Sierra Update Reintroduces "Root" Bug For Some Users | WIRED
- New MacOS Malware, Signed With Legit Apple ID, Found Spying On HTTPS Traffic
- New OSX.Pirrit Malware floods Mac devices with ads; spies on users
- Apple Security Flaws Give Some Researchers Concern About Deeper Issues | WIRED
- Windows Kernel Exploitation Tutorial Part 1: Setting up the Environment - rootkit
- Warning: New Undetectable DNS Hijacking Malware Targeting Apple macOS Users
- Apple inaugure le Nouvel An avec l'annonce d'une faille de sécurité dans macOS, la quasi-totalité des moutures de l'OS seraient affectées
- New macOS malware hijacks DNS settings and takes screenshots
- Mac Privacy: Sandboxed Mac apps can record your screen at any time without you knowing · Felix Krause
GNU-Linux_Security
Hardening_Linux_Defense
- Locking Down Linux: Using Ubuntu as Your Primary OS, Part 1 (Physical Attack Defense) « Null Byte :: WonderHowTo
- Top 20 OpenSSH Server Best Security Practices - nixCraft
- Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins - nixCraft
- 40 Linux Server Hardening Security Tips [2017 edition] - nixCraft
- Security-Enhanced Linux - Wikipedia
- A sysadmin's guide to SELinux | Opensource.com
- sudo - From a security standpoint should I add my user to the sudoers file or not? - Unix & Linux Stack Exchange
- Best practices for hardening sudo? - Information Security Stack Exchange
- 25 Hardening Security Tips for Linux Servers
- 10 Useful Open Source Security Firewalls for Linux Systems
- Unix security - Wikipedia
- Auto-login as Root - privileges, permissions model - privilege escalation - gtksu
- Fear Not Root - privileges - definitive breakdown
- Grafpup News Page » Multi user support in Puppy and Grafpup Linux - my thoughts - root, privileges, ActiveX - xterm, rxvt
- Privileges segregation in Puppy Linux - security model - root, spot and fido users - squashfs
- When does the Puppy linux security model make sense? - Unix & Linux Stack Exchange
- Google Hacker Discloses New Linux Kernel Vulnerability and PoC Exploit
- New Privilege Escalation Flaw Affects Most Linux Distributions
- Linux Soft Exploit Suggester - Search Exploitable Software On Linux - KitPloit - PenTest Tools for your Security Arsenal ☣
- x86_64 reverse TCP bind shell with basic authentication on Linux systems – Pentester's life
- why linux doesn't need antivirus - Google Search
- "Bad Taste" Vulnerability Affects Linux Systems via Malicious Windows MSI Files
- Linux antivirus and anti malware: 8 top tools | CSO Online
- Critical Code Injection Flaw In Gnome File Manager Leaves Linux Users Open to Hacking
- New Linux Malware Exploits SambaCry Flaw to Silently Backdoor NAS Devices
- opensource.com/business/16/6/managing-passwords-security-linux?sc_cid=70160000001273HAAQ
- Why does APT not use HTTPS?
- OpenWall unveils kernel protection project • The Register
- LKRG - Linux Kernel Runtime Guard
- Hard-Coded Password in Cisco Software Lets Attackers Take Over Linux Servers
- Controverse autour de Linux 4.17 : la dernière mouture du kernel supporte Speck, un algorithme de chiffrement rejeté par l'ISO
- hacking - ubuntu sudoers file hacked? - Server Fault
- Ethical Hacking: sudo less exploit
- How to exploit SUDO via Linux Privilege Escalation
- Dangerous Sudoers Entries – PART 1: Command Execution – NOEXEC tag - Compass Security Blog
- sudoer file security - Recherche Google
- How to extract and disassemble a Linux kernel image (vmlinuz) - objdump, /boot/System.map, extract-vmlinuz - reverse engineering
- security - Why there is no https transport for debian apt tool? - Unix & Linux Stack Exchange
D-Bus_Security
- Improving the security of D-Bus - vulnerbailities
FreeBSD_Exploitation
- Comparison of privilege authorization features - Wikipedia
- Why-doesnt-Linux-need-a-firewall-by-default-like-Windows-does
Web_Security
Platforms_Hacking
Google
Youtube
- The 'Despacito' YouTube Hack Was Probably Pretty Simple to Pull Off | WIRED
- Google study reveals how criminals break into Gmail accounts – Naked Security
- Google's 'Advanced Protection' Locks Down Accounts Like Never Before | WIRED
- hack google check device activity - Google Search
- Android Will Alert You When A New Device Logs-in Your Google Account
- Enable Google's New "Advanced Protection" If You Don't Want to Get Hacked
- Google study shows how your account is most likely to be hijacked
- Advanced Social Engineering, Part 2: Hack Google Accounts with a Google Translator Exploit « Null Byte :: WonderHowTo
- Google Advanced Protection: The Most Secure Account of All | WIRED
- How to Secure Your Google Account with Yubikey
- Always Carry Your Google Account's Two-Step Verification Codes With You
- Chrome's WebUSB Feature Leaves Some Yubikeys Vulnerable to Attack | WIRED
Facebook
- what about ddosing facebook - Google Search
- 4 Ways to Crack a Facebook Password & How to Protect Yourself from Them « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Hack Facebook, Part 1 (Same-Origin Policy) « Null Byte :: WonderHowTo
- Social Engineering, Part 2: Hacking a Friend's Facebook Password « Null Byte :: WonderHowTo
- Facebook Hacks « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Get Facebook Credentials Without Hacking Facebook « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Hack Facebook, Part 2 (Facebook Password Extractor) « Null Byte :: WonderHowTo
- what about ddosing facebook - Google Search
- Wait, Do You Really Think That’s A YouTube URL? Spoofing Links On Facebook
- Scam Alert: Your Trusted Friends Can Hack Your Facebook Account
- How to Hack Facebook Password Using Brute Force Attack - Develope IT
- Here's How To Hack Facebook Account Using Your Old Phone Number
- 10 Ways Hackers Hack Your Facebook Account and How to Prevent it
- Another Facebook Bug Allowed Anyone to Delete Your Photos
- How To Find Out If Your Facebook Account Has Been Hacked
- Researcher reports how to hack Facebook account with Oculus Integration
- Facebook's Mandatory Anti-Malware Scan Is Invasive and Lacks Transparency | WIRED
- facebook vulnerability | leaking the list of admins for any page - YouTube
- A Simple Bug Revealed Admins of Facebook Pages — Find Out How
- facebook-two-factor-authentication
Twitter
- Twitter notifies users about API bug that shared DMs with wrong devs | ZDNet
- How To Check If Your Twitter Account Has Been Hacked
- Making an XSS triggered by CSP bypass on Twitter. – tbmnull – Medium
LinkedIn
- how to create a perfect linkedin fake account - Google Search
- how to create a perfect linkedin fake account - Google Search
Instagram
- Hack Instagram Account Using BruteForce « Null Byte :: WonderHowTo
- Instagram-Py - Simple Instagram Brute Force Script - KitPloit - PenTest Tools for your Security Arsenal ☣
Oracle
- Oracle rushes out 5 patches for huge vulnerabilities in PeopleSoft app server – Ars Technica
- Highly Critical Flaw (CVSS Score 10) Lets Hackers Hijack Oracle Identity Manager
Uber
- how to hack into Uber Rider account - Google Search
- how to hack into Uber Rider account - Google Search
Tumblr
- How i hacked 23.900.000 tumblr domains at once :) – Ak1T4 – Medium
Atlassian
- Atlassian's HipChat Hacked — Users' Data May Have Been Compromised
Tinder
- Tinder's Lack of Encryption Lets Strangers Spy on Your Swipes | WIRED
Dreambox
ManageEngine
- 3 of 5 Fortune 500 companies vulnerable due to ManageEngine flaws
Amazon
- Hacking Amazon Key - Hacker shows how to access a locked door after the delivery - Security AffairsSecurity Affairs
- After dismissing security flaw, Amazon patches Key smart lock anyway | ZDNet
Git-based_platforms
- GitHub - zricethezav/gitleaks: Searches full repo history for secrets and keys 🔑
Cloudflare
- GitHub - pirate/sites-using-cloudflare: Archived list of domains using Cloudflare DNS at the time of the CloudBleed announcement.
- CloudFlare Watch
- How does CrimeFlare know a CloudFlare website’s true IP address? - Quora
- exploit cloudflare at DuckDuckGo
- How to bypass cloudflare & attack website - YouTube
- Bypass Cloudflare To Get Real IP Address of a Website (Using 3 Methods) - YouTube
- Use SQLMAP To Bypass Cloudflare WAF And Hack Website With SQL Injection - Sunny Hoi
- CloudFlair: Bypassing Cloudflare using Internet-wide scan data - Christophe Tafani-Dereeper
- GitHub - christophetd/CloudFlair: 🔎 Find origin servers of websites behind by CloudFlare using Internet-wide scan data from Censys.
- GitHub - m0rtem/CloudFail: Utilize misconfigured DNS and old database records to find hidden IP's behind the CloudFlare network
- GitHub - HatBashBR/HatCloud: Bypass CloudFlare with Ruby
- Cloudflare: Evading Cloud Security Protections | Rhino Security Labs
- Samiux's Blog: [RESEARCH] Cloudflare Can Be Bypassed
- KitPloit - PenTest Tools for your Security Arsenal ☣: Search results for cloudflare
- Search results for 'cloudflare' - 0x00sec - The Home of the Hacker
- Incident report on memory leak caused by Cloudflare parser bug
- 0-Day Flaws in Vanilla Forums Let Remote Attackers Hack Websites
Web_Browser_Security
- Stop Using Microsoft Edge To Download Chrome -- Unless You Want Malware
- Beware! Unpatched Safari Browser Hack Lets Attackers Spoof URLs
- Meet the malware which hijacks your browser and redirects you to fake pages | ZDNet
Browser_Pentesting_Addons
- 18 Extensions For Turning Firefox Into a Penetration Testing Tool
- 19 Extensions to Turn Google Chrome into Penetration Testing tool
Addons_Hacking
Addon_Code_Review
- malware - Are official browser add-ons really safe? - Information Security Stack Exchange
- Getting the source code of your favourite Firefox’s extension | GeekyCoder
- Source code of Firefox Add-ons - Information Security Stack Exchange
- Extract Firefox Addon Source Code: 4 Steps
- How to View or Edit the Source Code of a Firefox Addon | TechGainer
- MEGA Chrome extension hacked with cryptocurrency malware
- Browser Extensions: Are They Worth the Risk? — Krebs on Security
Flash_Player_Attacks
- Attackers Exploiting Unpatched Flaw in Flash — Krebs on Security
- (Unpatched) Adobe Flash Player Zero-Day Exploit Spotted in the Wild
- Adobe Patches Two Critical RCE Vulnerabilities in Flash Player
- Why Adobe Flash is a Security Risk and Why Media Companies Still Use it
- How secure is Flash? Here's what Adobe won't tell you | ZDNet
- Flash. Must. Die. | WIRED
- Adobe Issues Patch for Actively Exploited Flash Player Zero-Day Exploit
- Chrome 63 offers even more protection from malicious sites, using even more memory | Ars Technica
- A sneaky extension for Chrome, Firefox prevents its removal, hijacks browser
- 5 Popular Firefox Extensions You Should Remove Right Now
- user agent url - Google Search
- referrer url - Google Search
- Hack Like a Pro: How to Exploit IE8 to Get Root Access When People Visit Your Website « Null Byte :: WonderHowTo
- this page is trying to load scripts from unauthenticated sources - Google Search
- Many Chrome browser extensions do sneaky things | InfoWorld
- Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network « Null Byte :: WonderHowTo
- user agent url - Google Search
- referrer url - Google Search
- 8 More Chrome Extensions Hijacked to Target 4.8 Million Users
- Hackers Hijacked Chrome Extension for Web Developers With Over 1 Million Users
- WebDavC2 - A WebDAV C2 Tool - KitPloit - PenTest Tools for your Security Arsenal ☣
- Critical RCE Vulnerability Found in Cisco WebEx Extensions, Again — Patch Now!
- Beware! Hackers Can Steal Your Windows Password Remotely Using Chrome
- BlockIt - Chrome extension to block requests - CodeProject
- Malicious Chrome Extension Steals 'All Posted Data' without Login Credentials
- Google plans to stop trusting current Symantec certificates: Here's what tech pros need to know - TechRepublic
- Browser Autofill Is a Privacy Risk: Here's How to Turn It Off
- Top 15 Best Secure Android Browsers To Browse Web Securely
Client_Side_Scripts_Risks
Web-Servers_Security
NginX_Security
- Top 25 Nginx Web Server Best Security Practices - nixCraft
- ssl - How to redirect on the same port from http to https with nginx reverse proxy - Stack Overflow
- NGINX tutorial | Learn NGINX Fundamentals - YouTube
- nginx documentation
- HTTP/2 - Wikipedia
- Server Name Indication - Wikipedia
- Fix "The plain HTTP request was sent to HTTPS port" Error in Nginx
IIS
- Hackers Exploiting Microsoft Servers to Mine Monero - Makes $63,000 In 3 Months
- Over 70,000 Memcached Servers Still Vulnerable to Remote Hacking
- Critical Flaw in Apache Struts2 Lets Hackers Take Over Web Servers
- Backdoor Found in Popular Server Management Software used by Hundreds of Companies
- Exim Internet Mailer Found Vulnerable to RCE And DoS Bugs; Patch Now
- How I Hacked 40 Websites in 7 minutes – Hacker Noon
- Two Critical 0-Day Remote Exploits for vBulletin Forum Disclosed Publicly
- Securing your Linux web server – Hacker Noon
- Where should the web server root directory go in linux? - security, attacks
Web_App_Security
Hacking
Theory
- How do you pen test a REST API? - Information Security Stack Exchange
- web application - API Security Testing Methodologies - Information Security Stack Exchange
- RESTful_API_classical_attacks - Google Sheets
- Fuzzing - OWASP
- REST Security Cheat Sheet - OWASP
- REST Assessment Cheat Sheet - OWASP
- API Security Testing – How to Hack an API and Get Away with It (Part 1 of 3)
- Pentesting RESTful WebServices v1.0
- API Security Testing: Think Like a Bad Guy
- Avoid a DDoS Attack with API Testing
- PortSwigger Web Security Blog: Cracking the Lens: Targeting HTTP's Hidden Attack-Surface
- Types of Penetration Tests | Penetration Testing Tools
- Can Anyone Refer a Penetration & Security Testing Tool for RESTful API? - Quora
- file:///home/programmersn/Downloads/Cybersecurity-20170815T072300Z-001/Cybersecurity/Pent-testing/securing-restful-api.pdf
- Attack Surface Analysis · OWASP Cheat Sheet Series
Practice
- Having The Security Rug Pulled Out From Under You - Akamai Security Intelligence and Threat Research Blog
NullByte_Tutorials_Serie
- Hacking Web Apps « Null Byte :: WonderHowTo
- How to Attack Web Applications with Burp Suite & SQL Injection « Null Byte :: WonderHowTo
- How to Successfully Hack a Website in 2016! « Null Byte :: WonderHowTo
- Community Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training « Null Byte :: WonderHowTo
CRSF
CMS_Hacking
WordPress
- Hidden Backdoor Found In WordPress Captcha Plugin Affects Over 300,000 Sites
- Thousands of WordPress sites backdoored with malicious code | ZDNet
- Keylogger Campaign Hits Over 2,000 WordPress Sites
- Une faille zero-day dans le mécanisme de réinitialisation de MdP de WordPress, pourrait permettre à des attaquants de prendre le contrôle
SQL_Injections
PHP_Object_Injection
XSS
- Serious XSS flaw discovered in Evernote for Windows, update now! – Naked Security
- How to Write an XSS Cookie Stealer in JavaScript to Steal Passwords « Null Byte :: WonderHowTo
- Cross-site Scripting (XSS) - OWASP
- unescape() room - improving your Cross-Site Scripting (XSS) skills through challenges.
SSRF
- SSRF Through Gopher:// – tarun05blog
Path_Traversal
Using_Burp
- Beginners Guide to Burpsuite Payloads (Part 2) | Raj Chandel | Pulse | LinkedIn
- OWASP Testing Guide v4 Table of Contents - OWASP
- steal Api key through ddos attack - Google Search
- The Prices vs. Features of Web Application Vulnerability Scanners
- GitHub - AresS31/swurg: Parses Swagger files into the BurpSuite for automating RESTful API testing – approved by Burp for inclusion in their official BApp Store.
- Bill Sempf | Cracking and Fixing REST APIs
- Hack Yourself First: How to go on the Cyber-Offense | Pluralsight
- Which tool is better in security testing: ZAP or Burp Suite? - Quora
- Zap vs burp
- Using an HTTP Proxy and Fuzzer to create test data for a REST API application - YouTube
- owasp zap swagger file - Google Search
- FAQscanapis · zaproxy/zaproxy Wiki · GitHub
- Import API endpoints defined using swagger / openapis · Issue #2034 · zaproxy/zaproxy · GitHub
- steal Api key through ddos attack - Google Search
- Misconceptions in Client-Side Security: Reverse Engineering Obfuscation & Disguised Endpoints
- Part 2: How to stop me harvesting credit card numbers and passwords from your site
- #BugBounty — “How I was able to shop for free!”- Payment Price Manipulation
- CSS Steals Your Web Data | Hackaday
- Web Services Penetration Testing, Part 6: Fuzzing Parameters with Burp
- API Security: Offence and Defence 2nd Edition (W35) - Hakin9 - IT Security Magazine
- Home · zaproxy/zaproxy Wiki · GitHub
- GitHub - flipkart-incubator/Astra: Automated Security Testing For REST API's
Securing
- Secure Your REST API (The Right Way)
- RESTful API Best Practices and Common Pitfalls – Spencer Schneidenbach – Medium
- Top 5 REST API Security Guidelines
- API Security in REST vs SOAP
- Top-5 stupid security mistakes in web apps – Ivan Novikov – Medium
- Top 11 Misconceptions About APIs
- GitHub - YalcinYolalan/WSSAT: WEB SERVICE SECURITY ASSESSMENT TOOL
- Application Security
- Une vulnérabilité critique dans le framework Electron pourrait affecter de nombreuses applications populaires comme Skype, Slack et bien d'autres
- How to Make Sure a File is Safe Before Downloading
- Source Code Management Tools Affected by Severe Vulnerability
- Watch Someone Buy a Laptop for $1 Thanks to a Severe POS Vulnerability
- Simple Exploit Allows Attackers to Modify Email Content — Even After It's Sent!
- Data leak vulnerabilities patched in Fuze TPN portal | ZDNet
- Orange: PHP CVE-2018-5711 - Hanging Websites by a Harmful GIF
- New TeamViewer Hack Could Allow Clients to Hijack Viewers' Computer
- Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems
Infrastructure_and_Network_Security
Serverless_Infrastructures_Hacking
- Epsagon emerges from stealth with serverless monitoring tool – TechCrunch
- PenTest: Critical Infrastructure Penetration Testing - Pentestmag
Network_Pwning
Attacking_Websocket_Based_Communications
- https://www.sans.org/reading-room/whitepapers/detection/spicy-approach-websockets-enhancing-bro%E2%80%99s-websockets-network-analysis-generating-custom-protocol-parser-spicy-38035
- How to allow WebSocket traffic with Web Gateway
- https://media.blackhat.com/bh-us-12/Briefings/Shekyan/BH_US_12_Shekyan_Toukharian_Hacking_Websocket_Slides.pdf
- Would You Let Your Grandma Use WebSockets? | Qualys Blog
Fundamentals
- Kellgon - The Hacker Tutorial
DoS_DDoS-Botnets
Memcached_Amplification_Attacks
- Large DDoS Amplification Attacks Now Possible Via Memcached Servers
- Memcached Servers Abused for Massive Amplification DDoS Attacks
- Hackers can compromise Memcached Servers for DDoS attacks
- 'Kill Switch' to Mitigate Memcached DDoS Attacks — Flush 'Em All
- Memcached DDoS Exploit Code and List of 17,000 Vulnerable Servers Released
- Meet GhostDNS: The dangerous malware behind IoT botnet targeting banks
- GhostDNS: New DNS Changer Botnet Hijacked Over 100,000 Routers
- Hack Like a Pro: Denial-of-Service (DoS) Tools & Techniques « Null Byte :: WonderHowTo
- What is a DDoS Attack? Attacks Types/Classes - Amplification Techniques - Digital Attack Map
- Digital Attack Map - DDOS - Arbor Networks ATLAS® global threat intelligence system. - Google Ideas/Jigsaw - Big Picture Group for graphics visualization
- How DDoS Protection Works
- complete tutorial defense against ddos - Google Search
- New Hakai IoT botnet takes aim at D-Link, Huawei, and Realtek routers | ZDNet
- ddos squelching - Google Search
- Using IPv6 atomic fragments for a denial-of-service attack
- WireX DDoS Botnet: An Army of Thousands of Hacked Android SmartPhones
- One of 1st-known Android DDoS malware infects phones in 100 countries | Ars Technica
- Feds Shut Down 'Longest-Running' Andromeda Botnet
- How Netflix DDoS’d Itself To Help Protect the Entire Internet | WIRED
- 100,000-strong botnet built on router 0-day could strike at any time | Ars Technica
- Feds Shut Down 'Longest-Running' Andromeda Botnet
- How can a NULL pointer dereference flaw create a DoS attack?
- How does a WebKit framework flaw enable denial-of-service attacks?
- Teardrop Attack: What Is It And How Does It Work?
- Browser as Botnet, or the Coming War on Your Web Browser
- Scarab ransomware: new variant changes tactics - Malwarebytes Labs | Malwarebytes Labs
- 5 Powerful Botnets Found Exploiting Unpatched GPON Router Flaws
- Meet MyloBot malware turning Windows devices into Botnet
- Researchers unearth a huge botnet army of 500,000 hacked routers
- Google rolls out free cyberattack shield for elections and campaigns - CNET
- "Hide and Seek" Becomes First IoT Botnet Capable of Surviving Device Reboots
- FAQ - Digital Attack Map
- Arbor Networks - Wikipedia
- Project Shield - DDOS Mitigations by Google/Jigsaw
- Who’s Attacking Whom? Realtime Attack Trackers — digitalattackmap alternatives - Krebs on Security
- Network Ingress Filtering: Defeating DoS Denial of Service Attacks which employ IP Source Address Spoofing - Definitive mitigation techniques and best practices proposal to be implemented by ISP and hosting providers - Best Current Practices BCP 38 / RFC 2827
- Denial-of-service attack - DDoS - Tear-drop, R-U-Dead-Yet RUDY attacks - SYN Flood/Queue Flooding, half-open connections, SYN Cookies mitigation - UDP-based Amplification/Reflection Attacks as DNS/NTP/SNMP, Bandwidth Amplification Factor per Protocol , DRDoS - Mirai Botnet - Nuke - Phlashing/Permanent aka Bricking the system -
- What are the Different Types of DDoS Attacks? Definitive Attacks Types Classification Breakdown by OSI layers - by Arbor Networks Products/Solutions - Content Delvery Networks weaknesses - MTU Maximum Transmission Unit - IPSec Flood Attack | NETSCOUT
- Spoofed IP Address Distributed Denial of Service Attacks: Defense-in-Depth
- DDoS Attack Defense against Source IP Address Spoofing Attacks - de71d24276b35f6b2e397a2cf502fc946c6b.pdf
- SYN flood - DDOS Attack Technique - TCP three way handshake - Mitigations, SYN Cache/Cookies - Network Congestion
- The GitHub Memcached DDoS: It shouldn't have happened - mitigation | Synopsys
- memcached Reflection/Amplification Description and DDoS Attack Mitigation Recommendations | NETSCOUT
- Understanding DDoS Attacks & The Tools to See Them. - Visualization Attack
- What Is a Distributed Denial-of-Service (DDoS) Attack? Mitigation techniques - OSI Model - Attacks types - Volumetric, Protocol-based, Application layer - DNS Amplification, SYN Flood | Cloudflare
- Classifications of DDos attacks based on the protocol and on the mechanism of action: a short overview of modern approaches - Three classes of attacks : Volumetric/Flooding, Protocol-based/State-Exhaustion, Application-level - OSI Layers
- Classification of DDoS Attacks and their Defense Techniques using Intrusion Prevention System
- DDoS Attack Types & Mitigation Methods - classification - common types Syn Floods | Bps Bits per second, Pps Packets per second, Rps Requests per second
- DDoS attacks and defense mechanisms: classificationand state-of-the-art - definitive academic paper
- Types of DDoS attacks - definitive temrinilogy definitions | DDoS-GUARD knowledge Base
- CharGEN Flood DDOS Attack - UDP port 19- Source IP spoofing
- What is an IP Fragmentation Attack (TCP/Teardrop ICMP/UDP) and Mitigations - definitive - MTU - Example of how an IP datagram is fragmented and reassembled | Imperva
- Denial of Service - Buffer Overflows
- Classification/Taxonomy of DoS Attacks by Level of OSI Layer - definitive table - spoofed/non-spoofed IP source | INCIBE-CERT
- What is a Volumetric DDoS Attack? ICMP Flood, IP/ICMP Fragmentation, IPSec Flood, UDP Flood, DNS Query/NXDOMAIN Flooding, Reflection Amplifications | NETSCOUT
- What is a State-Exhaustion/Protocol Attack? SYN Flood, TCP Floods, SSL/TLS Exhaustion, DNS Query/NXDOMAIN Flooding - Mitigations, behavioral analysis, deep packet analysis
- What is an Application Layer Attack? BGP Hijacking, Long Lived TCP Sessions, Slowloris, Slow post, Slow Read, HTTP/s Flooding, CVE Attack Vector, Large Payload POST, Mimicked Browsing | NETSCOUT
- Amplification DDoS Attacks - definitive classification - TCP-based abusing synchronization three way handshake - Abusing UDP-based protocols as DNS, NTP, CharGEN, SSDP, RIPv1, Memcached - Abusing other protocols as ICMP, L2TP, SNMP, RCPBind/PortMapper, SQL RS Reporting System
- Krebs Site Targetted With Mirai Botnet based DDOS Attack — Krebs on Security
- Best DOS Attacks and Free DOS Attacking Tools [Updated for 2019] - Classification
- Technique: Endpoint Denial of Service DDoS - Protocol-based/State-Exhaustion/OS Exhaustion Attacks as SYN Flood, ACK Flood - Service/Application layer Attacks -- Concurrent TCP Connections
- Technique: Network Denial of Service - Volumetric/Bandwidth Exhaustion Attacks - DDOS - DNS/NTP Reflection Amplification, Flood - Mitigations - MITRE ATT&CK™
- 2016 Dyn DNS Provider cyberattack - DDOS through IoT devices-zombies infected with Mirai Botnet
- Why IoT Botnets Are So Lucrative For Cybercriminals - Mirai, 2016 Dyn attack| NETSCOUT
- What is a TCP SYN Flood aka Half-Open attacks - Mitigation methods as Micro blocks, SYN cookies, RST reset cookies, Stack tweaking
- Memcrashed - Major Memcached amplification attacks from UDP port 11211
- SYN Flood/Half-Open DDoS Attack - Direct/Spoofed/Distributed Attacks - definitive - spoofed SYN packets - ISP help in tracking spoofed packets - Mirai botnet - vs Volumetric/Bandwith-saturation/exhaustion attack - OS backlog queue - Mitigations as Backlog queue length increase, Oldest Half-Open connections recycling, SYN Cookies
- What is a DDoS Botnet - types of botnets, network topologies - Mitigations - definitive
- Hardening the TCP/IP stack to SYN flooding/spoofing attacks - definitive technical details - - Operating System Backlog queue handles incoming packets with SYN flag waiting for the three way handshake to complete (half-open connections) - Mitigations/detections and builtin protection techniques in Windows and Linux, as Increasing OS backlog queue and minimizing time of pending/half-open connections handling
- RFC 4987 - TCP SYN Flooding Attacks and Common Mitigations - definitive guide - Transmission Control Block TCB - Backlog - Spoofed IP Address Selection/Generation - RST/reset TCP Segment - DDoS
- Defending against a Denial-of-Service Attack on TCP - SYN Flood - OS TCP Backlog
- How to Detect and Prevent SYN Flood Attack In Linux - Mitigations - Backlog queue increase
- Hardening your Linux TCP/IP Stack Against SYN Floods - SYN Cookies - Network Hardening
- SYN Flood - TCB Table - Mitigations Micro-Blocks Allocations, SYN Cookies, Stack Tweaking
- What is a SYN Flood Attack? | NETSCOUT
- What is an HTTP Get/Post Flood | DDoS Attack Glossary | Imperva
- What is a DDoS Botnet | Common Botnets and Botnet Tools - Control And Commands C2 servers - Nitol, IMDDOS, Avzhan, ChinaZ, MrBlack, Cyclone, Pushdo, Cutwall
- HTTP Flood DDoS Attack | Cloudflare
- Memcached DDoS Attack | Cloudflare
- NTP Amplification DDoS Attack | DNS Flood/Amplification
- SSDP DDoS Attack | Cloudflare
- What is a DNS Flood? | Cloudflare
- UDP Flood DDoS Attack | Cloudflare
- Ping (ICMP) Flood DDoS Attack | Cloudflare
- What Is A Low And Slow Attack? Low And Slow DDoS Attack Definition | Cloudflare
- Application Layer DDoS Attack | Cloudflare
- Why are cryptocurrency sites being targeted by DDoS attacks? What is a cryptocurrency? Blockchain, centralized/decentralized, mining
- Smurf DDoS Attack | Cloudflare
- Ping of Death DDoS attack | ICMP
- What are HTTP GET/POST flood attacks? Intrusion Prevetion System IPS rules
- What DDoS Attacks Mean for Mobile Games, ISPs and Video Gaming Servers - Mitigation through VPNs and GRE
- Down the Rabbit Hole: The Making of Cloudflare Warp - GRE, Legacy VPN protocol PPTP - Load Balancing - MTU compatibility issue
- How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics - GRE packets flood - Lizard Stresser DDoS for hire service
- Breaking Down Mirai: An IoT DDoS Botnet Analysis - GRE flood
- The Mirai Botnet - definitive GRE Flood DDoS attack explanation, triggers resources exhaustion because of the computing power required for GRE packets de-encapsulation
- GitHub - jgamblin/Mirai-Source-Code: Leaked Mirai Source Code for Research/IoC Development Purposes - Mirai botnet malware
- Mirai-Source-Code/ForumPost.md at master · jgamblin/Mirai-Source-Code - Mirai botnet malware - original post from Anna-Senpai
- ip - GRE DDOS -- Wouldn't the firewall block it? - Information Security Stack Exchange
- Mirai IoT DDoS Botnet Source Code Reveals Specific Targeting Of Valve Source Engine Games On Steam | HotHardware - GRE Flood
- Mirai: The IoT Bot that Took Down Krebs and Launched a Tbps Attack on OVH - IP defragmentation through GRE IP/Eth DDoS Flood Attack - definitive visual explanation - DNS Water Torture
- IoT Attack Handbook - A Field Guide to Understanding IoT Attacks from the Mirai Botnet to Its Modern Variants - GRE IP Attack - Definitive Breakdown
- CyberX Reveals How Mirai Uses GRE Floods to Generate Largest DDoS Attack on Record - Mirai malware analysis - reverse engineering
- Mirai: what you need to know about the botnet behind recent major DDoS attacks | Symantec Connect Community
- GRE tunneling: Keeping human traffic unaffected during DDoS attacks
- How Google fought back against a crippling IoT- DDoS powered botnet and won | Project Shield - KrebsOnSecurity Mirai attack
- Why the silencing of KrebsOnSecurity opens a troubling chapter for the ‘Net | DDoS, Mirai botnet
- Inside the infamous Mirai IoT Botnet: A Retrospective Analysis - DDoS
- Attackers Leveraged Large CCTV Botnet to Launch DDoS Attacks
- Another Lizard Arrested, Lizard Lair Hacked — Hacking Group Lizard Sqaud DDoS for Hire Lizard Stresser service hacked
- Lizard Stresser DDoS Service of ‘Lizard Squad’ Gets Hacked, 14k Users Exposed
- What Is a Distributed Denial-of-Service (DDoS) Attack? | DNS Amplification - mitigations, black hole routing, rate limiting, WAF, anycast network diffusion
- DNS Flood - Bandwith Exhaustion/Volumetric DDoS attack
- Black hole (networking) - DDoS Mitigation
- What is DNS - Amplification/Flood DDoS Attacks
- DNS Amplification DDoS Attack - Mitigations, ISPs ingress filtering
- Reflections on reflection (attacks) - definitive in depth analysis on UDP-based Amplification/Reflection DDoS attacks - NTP, SSDP, IP fragmentation, DNS, SRCDS, CHARGEN, Call of Duty, SNMP, CLDAP, Sunrpc, Netbios, HTTP, SRCDS, RIP
- Web application security: Are you safe against Layer 7 Application DDoS attacks?
- How to prevent NTP DDoS amplification attacks | AARNet News
- DoS (Denial of Service) Attack Tutorial: Ping of Death, DDOS - Smurf, Buffer overlow, teardrop, SYN attack
- BCP38 is RFC2827: Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing - DDoS
Spoofing
IP_Spoofing
- IP address spoofing - Wikipedia
- The real cause of large DDoS - IP Spoofing
- network - Why don't ISPs filter on source address to prevent spoofing? - Information Security Stack Exchange
- IP Spoofing: Fundamentals and counter-measures - 1&1 IONOS
- Addressing the challenge of IP spoofing | Internet Society
- Why can't ISPs block spoofed packets? - Upgrade Magazine
- What is IP Spoofing - Mitigation through Packet filtering - Used in NTP/DNS Amplification DDoS Attacks
- Can one use IP-spoofing to anonymize DDOS attacks? amplification - Information Security Stack Exchange
- Would an ISP know if someone spoofed their IP address? - Quora
- What is IP Spoofing? How to protect yourself? DDOS - MitM - Malware distribution | NordVPN
MAC_Spoofing_Attacks
- How (and Why) to Change Your MAC Address on Windows, Linux, and Mac
- MAC spoofing
- Hacking Knowledge - The Power of Spoofing MAC Address • Raymond.CC
- How to Hack Open Hotel, Airplane & Coffee Shop Wi-Fi with MAC Address Spoofing - mitigation « Null Byte :: WonderHowTo
Website_Spoofing
- Website spoofing - phishing
- Hack Like a Pro: How to Clone Any Website Using HTTrack « Null Byte :: WonderHowTo
DNS_Spoofing
- DNS spoofing - cache poisoning
- Hack Like a Pro: How to Spoof DNS on a LAN to Redirect Traffic to Your Fake Website « Null Byte :: WonderHowTo
Wireless_Access_Point_Spoofing
- How to Hack Wi-Fi: Creating an Evil Twin Wireless Access Point to Eavesdrop on Data « Null Byte :: WonderHowTo
- Mitigating a Spoofed AP - access point - Cisco Meraki
- Evil twin (wireless networks) - Rogue Wireless Access Points - Spoofing - Phishing - Wikipedia
- Spoofing attack - TCP/IP - Referrer - Caller ID - Email address - Geolocation - GPS - Wikipedia
- How do fake emailers work? - Information Security Stack Exchange
- GitHub - WiPi-Hunter/PiDense: 📡Monitor illegal wireless network activities. (Fake Access Points)
- The Rogue Toolkit - An Extensible Toolkit Aimed At Providing Penetration Testers An Easy-To-Use Platform To Deploy Access Points - KitPloit - PenTest Tools for your Security Arsenal ☣
- one-minute-attack-let-hackers-spoof-hotel-master-keys
- Protocol spoofing - different from spoofin attack in security
- IDN homograph attack - script spoofing - alphabet representations mixing
Network_Monitoring_Sniffing
Monitoring_Tools
Zabbix
Enabling_Zabbix_Mapping_Feature
- [TUTORIAL] how to make a ZABBIX map with cautome background - YouTube
NagiOS
- Nagios : apprendre, installer et configurer - débutants
- How to Install Nagios 4 in Ubuntu and Debian
Traffic_Sniffing_Analyzing_Tampering
- Free Projects Download,Java, DotNet projects, Unlimited Free Downloads, documentation, source code, ieee projects, dot net ieee projects, java ieee projects, advanced java, core java, oracle, mysql, asp.net, c#.net, c sharp, sql server, ms.net, ms access,…
Websocket_Traffic_Sniffing
- How can I capture websocket traffic · Issue #899 · mitmproxy/mitmproxy · GitHub
- WebSockets in UI · Issue #2929 · mitmproxy/mitmproxy · GitHub
- WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa - hacking deep hunter
- wssip windows - Google Search
- wssip/README.md at master · nccgroup/wssip · GitHub
- WSSiP - Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Man In The Middle (MITM) SSL Proxies - Simple ways to see traffic between an SSL server and client in clear text. · GitHub
- Add support for non-HTTP flows to the UI - Websocket support
- mitmproxy/websockets.py at master · mitmproxy/mitmproxy · GitHub
- Events - websocket event capture, among others - mitmproxy docs
- WebSocket Messages should be shown to the user. · Issue #1547 · mitmproxy/mitmproxy · GitHub
- Replace our WebSocket stack with wsproto by Kriechi · Pull Request #2545 · mitmproxy/mitmproxy · GitHub
- mitmproxy/websocket.py at master · mitmproxy/mitmproxy · GitHub
- Packet sniffer using jpcap
- Protocols Supported by MitMProxy - websocket, http/2, raw TCP/TCP Proxy /Fallback
- Events - websocket event capture, among others - mitmproxy docs
- Man In The Middle (MITM) SSL Proxies - Simple ways to see traffic between an SSL server and client in clear text. · GitHub
- develop websocket sniffer - Google Search
MiTM-like_Attacks
Packet_Crafting
- 15 Best Free Packet Crafting Tools
- Packet crafting - Wikipedia
- network - What's the difference between mitm attack and sniffing? - Information Security Stack Exchange
- Ettercap - A Comprehensive Suite For Man In The Middle Attacks - KitPloit - PenTest Tools for your Security Arsenal ☣
- What is the difference between MITMproxy and SSLsplit? - Information Security Stack Exchange
- Mitmproxy tampering GET and POST request/response in one script - Stack Overflow
- mitmproxy MITM – My Cyber Security Blog
- Hack Like a Pro: How to Conduct a Simple Man-in-the-Middle Attack « Null Byte :: WonderHowTo
- ISPs May Be Helping Hackers to Infect you with FinFisher Spyware
- Man-in-the-middle attack - Wikipedia
- Man-in-the-browser - Wikipedia
- Man-on-the-side attack - Wikipedia
- How to Create an Evil Access Point with MitmAP « Null Byte :: WonderHowTo
- Ettercap (software) - Wikipedia
- ettercap vs wireshark at DuckDuckGo
- Injectify - Perform Advanced MiTM Attacks On Websites With Ease - KitPloit - PenTest Tools for your Security Arsenal ☣
- mitmproxy - an interactive HTTPS proxy
- Tutorial: Reverse Engineering a Private API Using MITM attack | Toptal
- TOWARDS USABLE AND FINE-GRAINED SECURITY FOR HTTPS WITH MIDDLEBOXES - Thesis- MASc-KhannaAbhimanyu-2017.pdf
- Decrypting TLS Browser Traffic With Wireshark – The Easy Way! | Jim Shaver
- Transparent SSL Interception Bridge with mitmproxy
- Charles Web Debugging Proxy • HTTP Monitor / HTTP Proxy / HTTPS & SSL Proxy / Reverse Proxy
- stut-it Martin Stut - Mitmproxy Cheat Sheet
- stut-it Martin Stut - Watching a Windows Machine's Internet Traffic With Mitmproxy
- HTTP Public Key Pinning - Wikipedia
- windows - Inspecting websocket traffic with proxy - Super User
- Configure Fiddler to decrypt HTTPS traffic - Progress Telerik Fiddler
- Comparison of packet analyzers - Wikipedia
- Packet analyzer - Wikipedia
- wireshark - Difference between sniffer tools - Network Engineering Stack Exchange
- How to Spy on Your "Buddy's" Network Traffic: An Intro to Wireshark and the OSI Model « Null Byte :: WonderHowTo
- Packet Analysis with Wireshark (W37) - Hakin9 - IT Security Magazine
- Microsoft Network Monitor - Wikipedia
- Microsoft Message Analyzer Operating Guide - Message Analyzer | Microsoft Docs
- Message Analyzer Tutorial - Message Analyzer | Microsoft Docs
- Netmon Inc. | DCIM / ITSM Tools Netmon and AKCP Authorized Distributor
- microsoft message analyzer vs wireshark at DuckDuckGo
- winpcap npcap at DuckDuckGo
- Filter by process/PID in Wireshark - Stack Overflow
- Capture and explore network traffic with Microsoft Message Analyzer
- Bettercap : MITM attack for sniffing traffic and passwords :Bettercap – HACK a DAY
- RawCap - A raw socket sniffer for Windows
- Process Monitor - Windows Sysinternals | Microsoft Docs
- SocketSniff - Windows Sockets (WinSock) Sniffer
- The Pappy Proxy
- TCPView for Windows - Windows Sysinternals | Microsoft Docs
- Configure a PHP/cURL application to use Fiddler - Progress Telerik Fiddler
- windows - Why Doesn't Fiddler Show Curl Traffic? - Stack Overflow
- Sniffing TCP traffic for specific process using Wireshark - Reverse Engineering Stack Exchange
- windows - Sniff traffic coming from one particular application? - Super User
- windows 7 - Capture traffic for specific application - Super User
- Proxocket - A Winsock Proxy Sniffer - NETRESEC Blog
- WinPcap: NPF - netgroup packet filter - driver internals manual
- Promiscuous mode - mode for a wired network interface controller (NIC) or wireless network interface controller (WNIC) that causes the controller to pass all traffic it receives to the central processing unit (CPU) rather than passing only the frames that the controller is specifically programmed to receive. This mode is normally used for packet sniffing that takes place on a router or on a computer connected to a wired network or one being part of a wireless LAN. Interfaces are placed into promiscuous mode by software bridges often used with hardware virtualization - switch
- linux - How to capture all incoming packets to NIC even those packets are not belonging to me - network monitoring/sniffing - switch vs hub - switch port mirroring - security - promiscuous mode - tcpdump -p
- Illustrated Guide to Monitoring and Tuning the Linux Networking Stack: Receiving Data - definitive in depths technica/visual epxlanation with diagrams
- Injecting chaos experiments into security log pipelines | Opensource.com
- network monitoring vs sniffing - Google Search
- Wireless Sniffers – Sniffing Tools in Ethical Hacking
- 4 Ways to Capture NTLM Hashes in Network
- SJET - JMX Exploitation Toolkit - KitPloit - PenTest Tools for your Security Arsenal ☣
- Secure channel - Wikipedia
- Packet Sniffing in Windows and Linux Using Python
- snooping vs sniffing at DuckDuckGo
- Malicious Packet Analysis & Network Defense (W32) - Hakin9 - IT Security Magazine
Wireless_Network_Cracking
WiFi_Hacking
KRACK_WPA2_attack
- wifi - Consequences of the WPA2 KRACK attack - Information Security Stack Exchange
- How to Protect Yourself from the KRACK Attacks WPA2 Wi-Fi Vulnerability « Null Byte :: WonderHowTo
- Release the KRACKen: WPA2 Wi-Fi Encryption Hackable Until All Clients & APs Are Patched « Null Byte :: WonderHowTo
- Google Fixes The KRACK WiFi Exploit For Android, Download OTA Now
- Krack wi-fi security flaw explained - BBC News
- Why the Krack Wi-Fi Mess Will Take Decades to Clean Up | WIRED
- The Flawed System Behind the Krack Wi-Fi Meltdown | WIRED
- Kali on KRACK | Kali Linux
- KRACK Detector - Detect and prevent KRACK attacks in your network - KitPloit - PenTest Tools for your Security Arsenal ☣
- KRACK Vulnerability Makes Wi-Fi Hacking Possible, Leaving Millions of Devices Exposed | WIRED
- https://www.usenix.org/system/files/conference/usenixsecurity18/sec18-chen_0.pdf
- New security flaw discovered in Wi-Fi routers | News
- Wireless Security & Hacking (W31) - Hakin9 - IT Security Magazine
ROCA_Attack
- Serious Crypto-Flaw Lets Hackers Recover Private RSA Keys Used in Billions of Devices
- Forget KRACK Attack, 5 Year Old Encryption Bug ROCA Returns For Google And Microsoft
About_WEP_Vulns
- WiFi (in)Security - Why WEP is no longer capable of protecting your WiFi
- How to decode WPA/WEP keys using Penetrate Pro - Coding Security
- How to Hack Wi-Fi: Cracking WEP Passwords with Aircrack-Ng « Null Byte :: WonderHowTo
WiFi_Jamming
- hacking how to interfere with public wifi hotspot - Google Search
- Hack Like a Pro: How to Get Even with Your Annoying Neighbor by Bumping Them Off Their WiFi Network —Undetected « Null Byte :: WonderHowTo
- WifiKill - Disabling WiFi for Other Devices - Coding Security
- how to spot the location of a wireless access point - Google Search
- How to Hack Wi-Fi: Getting Started with the Aircrack-Ng Suite of Wi-Fi Hacking Tools « Null Byte :: WonderHowTo
- There's a Right Way and Wrong Way to Use Public Wi-Fi
- how to spot the location of a wireless access point - Google Search
- How Hackers Kick Victims Off of Wireless Networks
- Hackers are targeting hotel Wi-Fi with particularly evil malware – BGR
- I play the security odds at Defcon by rolling the Wi-Fi dice - CNET
- Researcher Discloses 10 Zero-Day Flaws in D-Link 850L Wireless Routers
- WiFi Hacking From a Penetration Testers Perspective | Udemy
- Millions Of Smartphones Using Broadcom Wi-Fi Chip Can Be Hacked Over-the-Air
- Why Using a Public Wi-Fi Network Can Be Dangerous, Even When Accessing Encrypted Websites
- Keep Your Windows Computer Secure on Public Wireless Hotspots
- How to Wardrive on an Android Phone to Map Vulnerable Networks « Null Byte :: WonderHowTo
- Pixie Dust Attack WPS with Reaver - Coding Security
- Why WPA2-PSK can be a security risk even with an uncracked key
- Hacking WPA/WPA2 without dictionary/bruteforce using Fluxion » TechWorm
- How to find Wi-Fi password of all Connected Networks using CMD » TechWorm
- Hacking wifi using reaver kali linux - Coding Security
- whitepaper lp - 802.1x
- GitHub - WarenGonzaga/WiFi-Passview: An open source batch script based WiFi Passview for Windows!
WPA3
- wpa3-wi-fi-security-passwords-easy-connect - WIRED
- WPA3 Standard Officially Launches With New Wi-Fi Security Features
- WiFi's tougher WPA3 security is ready
Bluetooth_Hacking
- Bluetooth Hacking « Null Byte :: WonderHowTo
- Bluetooth Low Energy Hacking - Hakin9 - IT Security Magazine
- BlueBorne: Critical Bluetooth Attack Puts Billions of Devices at Risk of Hacking
- Understanding Bluetooth Security | Duo Security
- IoT Hacking – Beginner’s Guide to Hacking Bluetooth Low Energy (BLE) – Part 2 | Blog for IoT Security
- Turn Bluetooth Off When You're Not Using It | WIRED
Phone_Communications-Cellular_Nets
- A 'Scarily Simple' Bug Put Millions of Cox Communications Customers at Risk | WIRED
- how to track a phone call to caller - Google Search
- Tracking phone location - Quora
- how to track a phone call to caller - Google Search
- This Teenager Hacked 4G LTE Network And Is Using Free Internet
- New 4G LTE Network Attacks Let Hackers Spy, Track, Spoof and Spam
- Attacks on 4G LTE networks could send fake emergency alerts
- Researchers Uncover New Attacks Against LTE Network Protocol
RFID-NFC_Attacks
- Software Defined Radio Attack Tool: RFCrack
- Hackers can takeover & control emergency alarm system with a $35 radio
- Have an NFC-Enable Phone? This Hack Could Hijack It « Null Byte :: WonderHowTo
- rfid vs nfc security at DuckDuckGo
- Security Risks of Near Field Communication Technology
- How does Near Field Communication (NFC) compare to RFID technologies? Looking for a functional primer - Information Security Stack Exchange
- How to Hack Wi-Fi: Cracking WPA2-PSK Passwords Using Aircrack-Ng « Null Byte :: WonderHowTo
- How to Hack Wi-Fi: Get Anyone's Wi-Fi Password Without Cracking Using Wifiphisher « Null Byte :: WonderHowTo
- How to Hack Wi-Fi: Capturing WPA Passwords by Targeting Users with a Fluxion Attack « Null Byte :: WonderHowTo
- How to Map Networks & Connect to Discovered Devices Using Your Phone « Null Byte :: WonderHowTo
- Hacking a Bird in the Sky: Hijacking VSAT Connection
- Small satellite terminals (VSAT) are vulnerable to Cyber attack
- Ships Can Be Hacked By Exploiting VSAT Communication System
- Remotely hacking ships is now a thing, and it's a problem
- Hacker Cracks Satellite Communications Network - News
- Satellite Communications Wide Open To Hackers
- Ethical Hacking: Hacking Wireless Networks | Pluralsight
- wifi - Can he see the websites I visited? - Information Security Stack Exchange
- Hackers Can Silently Control Siri, Alexa & Other Voice Assistants Using Ultrasound
- Wireless Security- InfoSec
- This Radio Hacker Could Hijack Emergency Sirens to Play Any Sound | WIRED
- Wireless Security Attacks (W18) - eForensics
Honeypots
- how to defeat honeypot server - Google Search
- Hack Like a Pro: How to Set Up a Honeypot & How to Avoid Them « Null Byte :: WonderHowTo
- Catching the hackers in the act - BBC News
- Honeypot (computing) - Wikipedia
- Deception tech helps to thwart hackers' attacks - BBC News
- What is Honeyspot? - InfoSec Addicts
Cloud_Security
AWS
- S3 Buckets for Good and Evil | Pentest Armoury
- Abusing the AWS metadata service using SSRF vulnerabilities - Christophe Tafani-Dereeper
- Hackers Can Stealthily Avoid Traps Set to Defend Amazon's Cloud | WIRED
- Western Digital's My Cloud NAS Devices Turn Out to Be Easily Hacked
Hacking_Air-Gapped_Devices
- Hacker Can Steal Data from Air-Gapped Computers Using IR CCTV Cameras
- Le clignotement d'un disque dur peut être utilisé pour dérober des données sensibles, des universitaires israéliens le mettent en évidence
- Hackers Can Now Steal Data Even From Faraday Cage Air-Gapped Computers
- Air Gap Hacker Mordechai Guri Steals Data With Noise, Light, and Magnets | WIRED
- Are air gaps entirely impermeable? Then you don't know Ben-Gurion team's research
- Hacker Can Steal Data from Air-Gapped Computers through Power Lines
Satellite_Communications
- Backdoor Account Found in Popular Ship Satellite Communications System
- Hackers can Exploit Load Planning Software to Capsize Balance of Large Vessels
Attacking_DHCP_Servers
- Red Hat Linux DHCP Client Found Vulnerable to Command Injection Attacks
DNS_Server_Attacks
- Spoofing DNS with fragments | PowerDNS Blog
- How's that encryption coming, buddy? DNS requests routinely spied on, boffins claim • The Register
- Extending attack surface in distributed environments - Pentestmag
- DNS over HTTPS · curl/curl Wiki · GitHub
- Google hacker found a critical flaw in Blizzard Games that expose millions of PCs to DNS Rebinding attacksSecurity Affairs
- New Point-of-Sale Malware Steals Credit Card Data via DNS Queries
Mail_Protocols_Hacking
- Mail Server Security: Potential Vulnerabilities and Protection Methods
- Email Protocols: What are the advantages and disadvantages of IMAP versus POP3? - Quora
- Testing for IMAP/SMTP Injection (OTG-INPVAL-011) - OWASP
- POP IMAP WEB
- Increase Email Security with IMAP Protocol Instead of Using POP Mail
Firewalls
- 16 iptables tips and tricks for sysadmins | Opensource.com
- Pare-feu -- E. Godard
- Linux firewalls: What you need to know about iptables and firewalld | Opensource.com
- What is a Firewall? What does it do? - Coding Security
- Firewall Bursting: A New Approach to Better Branch Security
- WhatWaf - Detect And Bypass Web Application Firewalls And Protection Systems - KitPloit - PenTest Tools for your Security Arsenal ☣
- Bypass Firewall Restrictions with Metasploit (reverse_tcp_allports) | Raj Chandel | Pulse | LinkedIn
- GitHub - LeonBroseliske/CFC: Centralized Firewall Control
- Tunneling Traffic Through DNS to Bypass Firewalls - DDoS Attacks
- Firewalls: What They Are & Why You Need Them
- Bypassing Web Application Firewall (W30) - Hakin9 - IT Security Magazine
- waf vs firewal at DuckDuckGo
- What is a WAF? | Web Application Firewall explained | Cloudflare
- Web application firewall - WAF
- How we made Firewall Rules - ASN matching
- Introduction of Firewall in Computer Network - ACLs, next generation firewall - Host based, network based
LDAP_Based_Services_Hacking
Active_Directory
- Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
- hacking active directory - Google Search
- GitHub - DanMcInerney/icebreaker: Gets plaintext Active Directory credentials if you're on the internal network.
- GitHub - l0ss/Grouper: A PowerShell script for helping to find vulnerable settings in AD Group Policy.
- Automate Network Attacks Against Active Directory: icebreaker
- Beyond LLMNR/NBNS Spoofing – Exploiting Active Directory-Integrated DNS
VoIP_Hacking
- Listen to a VOIP call with Wireshark - Coding Security
Routers_And_Networking_Devices_Hacking
- Cisco zero-day exploited in the wild to crash and reload devices | ZDNet
- RouterSploit v3.4.0 - Exploitation Framework For Embedded Devices - KitPloit - PenTest Tools for your Security Arsenal ☣
- Serious D-Link router security flaws may never be patched – Naked Security
- New Exploit for MikroTik Router WinBox Vulnerability Gives Full Root Access
- A mysterious grey-hat is patching people's outdated MikroTik routers | ZDNet
- MikroTik router vulnerability lets hackers bypass firewall to load malware undetected
- Flaw in 4GEE WiFi Modem Could Leave Your Computer Vulnerable
- Motherboard Hacking Livestream: How to Pwn a Router - Motherboard
- Hackers Took Over My Router and I Had NO Clue
- router acl - Google Search
- Beware! Dozens of Linksys Wi-Fi Router Models Vulnerable to Multiple Flaws
- Hacking the Sonoff Wifi Switch - Part 1
- Researcher found multiple vulnerabilities in NETGEAR Routers, update them now!Security Affairs
- Hack Like a Pro: How to Find Any Router's Web Interface Using Shodan « Null Byte :: WonderHowTo
- Critical flaw leaves thousands of Cisco Switches vulnerable to remote hacking
- Router reboot, updates, password are key to home network security
- How insecure is your router? | Opensource.com
- How to Protect Your Router From the Latest Malware Attack
- FBI Urges Everyone to Reboot All Routers Immediately | Digital Trends
- Hackers are exploiting a new zero-day flaw in GPON routers
- DrayTek Router Zero-Day Under Attack
- Here's how hackers are targeting Cisco Network Switches in Russia and Iran
- This new router exploit is the motivation you need to switch to a mesh solution | Android Central
- networking - Reaching a device in my LAN from the Internet - internal/private IP access - Port forwarding security - VPN - SSH - subnetwork isolation/partitionning
ISP_Pwning
- How i hacked my Internet Service Provider and automated the attack. ( Hacked to Learn)
P2P-Torrenting_Security_Risks
- torrent clients security dangers at DuckDuckGo
- testing S3 security - Google Search
- New “Quad9” DNS service blocks malicious domains for everyone – Ars Technica
- Wireless vs Wired network security comparison - Google Sheets
- WLAN security: Best practices for wireless network security
- Cloud security best practices - Google Sheets
- testing S3 security - Google Search
- Overcoming ransomware threat - Google Sheets
- Vulnerability remediation of WannaCry flaw raises concerns
- Risk & Repeat: WannaCry ransomware worm shakes tech industry
- public key infrastructure - How does SSL/TLS PKI work? - Information Security Stack Exchange
- DMZ (computing) - Wikipedia
- 10 network security tools everyone should use.pdf
- networking - Why does encryption not destroy the way networks work? - Super User
- The security pros and cons of using a free FTP tool
- How does IP hijacking work and how can it be prevented?
- What REALLY Happened with the Juniper Networks Hack? « Null Byte :: WonderHowTo
- Software defined radio · AnarchoTechNYC/meta Wiki
- Ethical Hacking: Sniffing | Pluralsight
- DNS resolver 9.9.9.9 will check requests against IBM threat database • The Register
- Net filters help avoid dodgy domains - BBC News
- dns hijacking vs dns poisoning - Google Search
- Nethammer—Exploiting DRAM Rowhammer Bug Through Network Requests
- Basic Network Attacks in Computer Network - GeeksforGeeks
NTP_Security
- Attacking the Network Time Protocol - NTP security - DDoS - Kiss Of Death KoD
- NTP server misuse and abuse - security - attacks - embedded devices, IoT - reflection/amplification NTP DDoS
- datacenter - What is an acceptable secure time source in a datacentre environment? - Server Fault
- Best Practices for NTP Services - BCP
- Don't update NTP – stop using it - security vulnerabilities, vs tlsupdate - attacks - HTTPS HSTS, NTP MitM tool Delorean - TLS
- NTP security - MAC, NTS, and MS-SNTP - Authentication Support - crypto-nak - NTS network time security
- Welcome to NTPsec - definitive reference - Welcome to the NTPsec project - a secure, hardened, and improved implementation of Network Time Protocol derived from NTP Classic, Dave Mills’s original
- NTP Security Analysis
- NTP "NAK to the Future" - crypto-nak packets - vulnerability -
- Security Evaluation of NTP - cisco - crypto-nak - vulnerabilities
- Authentication Support - description of the various cryptographic authentication provisions in NTPv4 -
- Analysis of Vulnerability CVE-2016-4957 in NTPD - daemon - crypto-nak
- NTP : Security vulnerabilities
Databases_Security
Database-Big_Data_Security
- Big Data and Cybersecurity: Opportunity or Threat?
- MySQL UDF Exploitation | 🔐Blog of Osanda
- SQL Injection 101: Database & SQL Basics Every Hacker Needs to Know « Null Byte :: WonderHowTo
- Learning Pentesting with Metasploitable3: Exploiting Elasticsearch
- MIT CSAIL Parallel and Distributed Operating Systems Group
Owning_Virtualization_Systems
- Attack Uses Docker Containers To Hide, Persist and Plant Malware | Threatpost | The first stop for security news
- VMware Patches Bug That Allows Guest to Execute Code on Host | Threatpost | The first stop for security news
- UTM, SIEM. What's the difference?
- What is Cyber Resilience and why should you care? | Prashant Chaturvedi | LinkedIn
- Unified Threat Management - Wikipedia
- Preventing Network Security Threats
- PenTest: Critical Infrastructure Penetration Testing - Pentestmag
Mobile_Security
Android
Android_Device_Rooting
- Android Malware Analysis - eForensics
- Google Adds Control-Flow Integrity to Beef up Android Kernel Security
- Drozer v2.4.4 - The Leading Security Assessment Framework For Android - KitPloit - PenTest Tools for your Security Arsenal ☣
- Android password managers vulnerable to phishing apps – Naked Security
- Malware on Android: The 5 Types You Really Need to Know About
- All Android versions affected by this vulnerability, except Pie | Pocketnow
- Millions of Android Devices Are Vulnerable Out of the Box
- Marcher Android Banking Trojan Combines 3 Threats Into 1 Scheme
- honor 8 encryption robustness - Google Search
- Toast overlay being used by malicious Android apps to install additional malware
- Google Begins Removing Play Store Apps Misusing Android Accessibility Services
- How to Hack Android Using Kali (Remotely) « Null Byte :: WonderHowTo
- Toast Overlay Message Exploit Found on the Google Play Store
- Another Shady App Found Pre-Installed on OnePlus Phones that Collects System Logs
- This malware turns itself into ransomware if you try to remove it
- Android Apps Infected with Sockbot Malware Turn Devices into Botnet
- This nasty new Android ransomware encrypts your phone -- and changes your PIN | ZDNet
- First Android Malware Found Exploiting Dirty COW Linux Flaw to Gain Root Privileges
- Android malware in Google Play racked up 4.2M downloads: Are you a victim? | ZDNet
- Over 500 Android Apps On Google Play Store Found Spying On 100 Million Users
- CopyCat malware infected 14 million outdated Android devices
- The 'Cloak & Dagger' Attack That Bedeviled Android For Months | WIRED
- Google Adds New Behavior-Based Malware Scanner To Every Android Device
- Faketoken Android Malware Can Steal Victims’ Calls, Texts, and Credit Cards – The Merkle
- 5 of the Most Dangerous Android Viruses and How to Get Rid of Them – Incognisys
- Google Detects Dangerous Spyware Apps On Android Play Store
- This Android malware steals data from 40 apps, spies on messages and location | ZDNet
- Thousands of Android Apps Infected with SonicSpy Spyware
- All Android Phones Vulnerable to Extremely Dangerous Full Device Takeover Attack
- How did firmware create an Android backdoor in budget devices?
- Android Trojan Now Targets Non-Banking Apps that Require Card Payments
- Google Play Let Malware Disguised as Messaging Apps in Store | Fortune
- Vast Majority Of Android Devices Are Vulnerable To 'Stagefright' Exploit That Can Be Executed Via Text Message, According To Researchers
- How have ARM TrustZone flaws affected Android encryption?
- How did vulnerabilities in AirWatch Agent and Inbox work?
- How does the boot mode vulnerability in Android work?
- Mobile Data Loss: Threats and Countermeasures
- Android Spyware: Google Removes 500 Apps Over Privacy Vulnerability
- Researchers craft Android app that reveals menagerie of hidden spyware; legally barred from doing the same with iOS / Boing Boing
- Critical Flaw in Major Android Tools Targets Developers and Reverse Engineers
- Google Detects Android Spyware That Spies On WhatsApp, Skype Calls
- 'Janus' vulnerability allows attackers to modify APKs without changing signature, APKMirror already protected
- Google just discovered a dangerous Android Spyware that went undetected for 3 Years
- Android Flaw Lets Hackers Inject Malware Into Apps Without Altering Signatures
- Password Stealing Apps With Over A Million Downloads Found On Google Play Store
- Android Malware Will Destroy Your Phone. No Ifs and Buts About It
- This New Android Malware Can Physically Damage Your Phone
- 'Loapi' mobile malware is five attacks rolled into one: Kaspersky | TheHill
- A newly discovered strain of Android malware contains never-seen surveillance features / Boing Boing
- How to Gain Complete Control of Any Android Phone with the AhMyth RAT « Null Byte :: WonderHowTo
- How to Open a Backdoor in Android Devices - Hakin9 - IT Security Magazine
- How to hack android device network using Network Spoofer - Coding Security
- GitHub - dkhuuthe/MADLIRA: Malware detection using learning and information retrieval for Android
- Peeping Inside Android Applications - Hakin9 - IT Security Magazine
- What Is Juice Jacking? Can Charging My Phone In A Public Port Lead To Data Hack?
- VirusTotal launches 'Droidy' sandbox to detect malicious Android apps
-
- RAMpage Attack Explained—Exploiting RowHammer On Android Again!
- GLitch: New 'Rowhammer' Attack Can Remotely Hijack Android Phones
- Evil-Droid - Framework to Create, Generate & Embed APK Payloads - KitPloit - PenTest Tools for your Security Arsenal ☣
- Exploiting Decades-Old Telephone Tech to Break Into Android Devices - Wired
- Critical Flaw in Fortnite Android App Lets Hackers Install Malware
iOS
iOS_Jailbreaking
- The Jailbreaking Community Is Bracing for Google to Publicly Drop an iPhone Exploit - Motherboard
- Pangu Hackers have Jailbroken iOS 12 on Apple's New iPhone XS
- The Life, Death, and Legacy of iPhone Jailbreaking - Motherboard
- You Can Now Make $1.5 Million For Jailbreaking The iPhone - Motherboard
- Want An iPhone Hacking Tool? Google Releases A Powerful Software
- Google Researcher Releases iOS Exploit—Could Enable iOS 11 Jailbreak
- New iPhone Passcode Bypass Hack Exposes Photos and Contacts
- iOS 12.1 passcode bypass hack discovered just few hours after its release
- NSA finally admits why it couldn't hack San Bernardino shooter's iPhone | ZDNet
- Hackers Claim to Break Face ID a Week After iPhone X Release
- Just one day after its release, iOS 11.1 hacked by security researchers | ZDNet
- iPhone Apps With Camera Permissions Can Secretly Take Your Photos Without You Noticing
- Apple’s latest security patch fixes a bug that lets hackers take over your phone via Wi-Fi - The Verge
- Just one day after its release, iOS 11.1 hacked by security researchers | ZDNet
- Face ID iPhone X 'hack' demoed live - BBC News
- Google Researcher Publishes PoC Exploit for Apple iPhone Wi-Fi Chip Hack
- Wallet-snatch hack: ApplePay 'vulnerable to attack', claim researchers • The Register
- Zero-day iOS HomeKit vulnerability allowed remote access to smart accessories including locks, fix rolling out | 9to5Mac
- Apple HomeKit flaw left smart gadgets vulnerable - BBC News
- iPhone Bugs Are Too Valuable to Report to Apple - Motherboard
- Security News This Week: Apple Patches a Very Bad iOS HomeKit Bug | WIRED
- FBI Hacker Says Apple Are 'Jerks' and 'Evil Geniuses' for Encrypting iPhones - Motherboard
- Apple’ iBoot Baseband Code for Various iPhone Models Leaked on GitHub
- Secret code from the iPhone was posted to Github in the ‘biggest leak in history’ – BGR
- Fuite d'iBoot : ce qui s'est réellement passé avec cette portion de code pour iPhone, des membres d'une communauté de débridage témoignent
- Phone-Cracking Firm Found a Way to Unlock Any iPhone Model
- Apple pushes back on hacker's iPhone passcode bypass report | ZDNet
- USB Accessory Can Defeat iOS's New "USB Restricted Mode" Security Feature
- The iPhone Wiki - definitive reference resources - jailbreak, firmwares details
- Bootrom - The iPhone Wiki - apple SecureROM
Hacking_SIM_Cards
- How a man hacked his victims' SIM cards to steal millions of dollars
- How to Protect Your SIM Card and Phone Number - Motherboard
Mobile_Theft
- lost-stolen-phone-what-to-do
Juice_Jacking
- 0-Days Found in iPhone X, Samsung Galaxy S9, Xiaomi Mi6 Phones
- Credit Card Fraud Reported After People Purchased OnePlus Smartphones
- Ethical Hacking: Hacking Mobile Platforms | Pluralsight
- OnePlus Left A Backdoor That Allows Root Access Without Unlocking Bootloader
- Mobile Pwn2Own: Hackers pwn iPhone, Huawei, Galaxy and Pixel Phone
- Mobile Bootloaders From Top Manufacturers Found Vulnerable to Persistent Threats
- Beware! Viral Sarahah App Secretly Steals Your Entire Contact List
- How the Broadpwn Wi-Fi Vulnerability Impacted a Billion iPhones and Android Phones | WIRED
- How the NSA Could Bug Your Powered-Off iPhone, and How to Stop Them | WIRED
- All OnePlus Devices Vulnerable to Remote Attacks Due to 4 Unpatched Flaws
- OnePlus denies checkout page hack amid credit card fraud reports
- Hard-coded Password Lets Attackers Bypass Lenovo's Fingerprint Scanner
- blackberry security issues - Google Search
- How CIA Agents Covertly Steal Data From Hacked Smartphones (Without Internet)
- Hackers Can Steal Your Passwords Just by Monitoring SmartPhone Sensors
- Trolldi : l'application la plus sécurisée serait-elle celle qui n'a aucune ligne de code ? Un développeur partage ses astuces pour y arriver
- Free Mobile Pentesting Lesson
- Phone Numbers Were Never Meant as ID. Now We’re All At Risk | WIRED
- root access - What is the difference between: Rooting, Jailbreak, ROM, Mod, etc.? Unlocking the bootloader - Rooting - Jailbreaking - ROM - NAND and Nandroid - Operating System - Mod (e.g. CyanogenMod) - Recovery (ClockworkMod, Amon Ra) - Custom Kernel (e.g. LeshaK's kernel) - Firmware - Driver - Over The Air (OTA) update - Fastboot - SIM unlocking - Flashing - SPL (Second Program Loader) - definitive answer - Android Enthusiasts Stack Exchange
Embedded_Systems-Hardware_and_IoT_Exploitation
Smartwatches_Pwning
- MiSafes' child-tracking smartwatches are 'easy to hack' - BBC News
- How open source hardware increases security | Opensource.com
Industrial_Environment_Attacks
IIoT_security
- ReVuln Found 0day Vulnerabilities for SCADA Systems
- PenTest: Pen Testing SCADA Architecture - Pentestmag
- Industrial Control Systems' Cybersecurity: Bundle - 2 ebooks - Pentestmag
- IEC 62443 Security Assurance Levels Explained
- IEC 62443-4-1:2018 | IEC Webstore
- A Four Step Guide to Secure Your ICS Network Using ISA 99/IEC 62443
Supply_Chain_Attack
- Supply chain attack - Wikipedia
CPUs-Chips
- Intel discloses another set of processor vulnerabilities
- Sandsifter - The X86 Processor Fuzzer - KitPloit - PenTest Tools for your Security Arsenal ☣
Intel_Management_Engine_Vuln
- PC vendors scramble as Intel announces vulnerability in firmware [Updated] | Ars Technica
- Intel Management Engine Flaws Leave Millions of PCs Exposed | WIRED
- Intel's super-secret Management Engine firmware now glimpsed, fingered via USB • The Register
- System76 va désactiver Intel Management Engine de certains de ses ordinateurs portables Linux, après la découverte de vulnérabilités
- Intel's Management Engine, a secure-computer-within-your-computer, is really, really insecure / Boing Boing
- Researcher finds another security flaw in Intel management firmware [Updated] | Ars Technica
- New Intel AMT Security Issue Lets Hackers Gain Full Control of Laptops in 30 Seconds
- Positive Technologies - learn and secure : How to Hack a Turned-off Computer, or Running Unsigned Code in Intel ME
Meltdown-Spectre_Vulns
- 7 New Meltdown and Spectre-type CPU Flaws Affect Intel, AMD, ARM CPUs
- Linus Torvalds talks frankly about Intel security bugs | ZDNet
- Major Linux distros have Meltdown patches, but that's only part of the fix | ZDNet
- Spectre Patch Causes 'Significant Slowdown' On Older OS, Chips
- Spectre-Meltdown-Checker - Spectre & Meltdown Vulnerability/Mitigation Checker For Linux - KitPloit - PenTest Tools for your Security Arsenal ☣
- How to Check and Patch Meltdown CPU Vulnerability in Linux
- Intel Warns Users Not to Install Its 'Faulty' Meltdown and Spectre Patches
- How Much Slower Will My PC Become After Meltdown And Spectre Patches?
- Is my PC vulnerable to Meltdown and Spectre? InSpectre tells you | PCWorld
- Intel admits Spectre patch problems also affect newer Core chips
- Intel reveals 0-25 percent performance impact from Meltdown and Spectre patches | PC Gamer
- fossbytes.com | 522: Connection timed out
- Intel's Never-Ending Spectre Saga Continues to Be a Hot Mess
- New Windows patch disables Intel’s bad Spectre microcode fix | Ars Technica
- google.fr/amp/s/www.engadget.com/amp/2018/01/28/intel-told-chinese-firms-of-meltdown-flaws-before-us/#ampshare=https://www.engadget.com/2018/01/28/intel-told-chinese-firms-of-meltdown-flaws-before-us/
- Newly Discovered Variants Of Meltdown/Spectre Exploit Cache Coherency Across Cores
- Linus Torvalds declares Intel fix for Meltdown/Spectre ‘COMPLETE AND UTTER GARBAGE’ | TechCrunch
- Intel Releases New Spectre Patch Update for Skylake Processors
- 139 pieces of (seemingly nonfunctional) malware that exploit Spectre and Meltdown are now circulating in the wild / Boing Boing
- 139 Malware Samples Identified that Exploit Meltdown & Spectre Flaws
- Hundreds Of Meltdown, Spectre Malware Samples Found In The Wild
- Meltdown/Specter-based Malware Coming Soon to Devices Near You, Are You Ready?
- Meltdown et Spectre : Intel abandonne le développement des mises à jour de microcodes pour certains processeurs, une décision qui ne surprend pas
- MeltdownPrime and SpectrePrime: Researchers nail exploits
- Microsoft's Meltdown Patch Made Windows 7 PCs More Insecure
- Speculative execution - Eager/Predictive/Lazy Execution
- After Meltdown and Spectre, Another Scary Chip Flaw Emerges | WIRED
- Spectre/Meltdown : de nouvelles failles dans les processeurs, elles permettent de lire les registres internes, la mémoire kernel et celle de l'hôte
- Warnings over fresh processor security flaws - BBC News
- 8 New Spectre-Class Vulnerabilities (Spectre-NG) Found in Intel CPUs
- Eight new Spectre Variant Vulnerabilities for Intel Discovered - four of them critical
- Two New Spectre-Class CPU Flaws Discovered—Intel Pays $100K Bounty - Hacking Bounty
- Spectre bug protection forcing Chrome to use 10 to 13% more RAM
- New Spectre 1.1 and Spectre 1.2 CPU Flaws Disclosed
- Linux Kernel Developer Criticizes Intel's Meltdown Disclosure
- Vulnerabilities Associated with CPU Speculative Execution - Wiki - VulWiki
- Researchers find almost EVERY computer with an Intel Skylake and above CPU can be owned via USB
- Intel Management Engine, Explained: The Tiny Computer Inside Your CPU
- Critical Flaws in Intel Processors Leave Millions of PCs Vulnerable
- Un malware utilise une fonction sournoise des processeurs Intel pour voler des données et éviter les pare-feu depuis presque dix ans
- Rosenbridge - Hardware Backdoors In Some X86 CPUs - KitPloit - PenTest Tools for your Security Arsenal ☣
Cryptoprocessors-Secure_Enclaves
- Secure cryptoprocessor - TMPs vs HSMs - Smartcards - Vulnerbailities, attacks - Full disk encryption, boot PIN, cold boot attack, data remanence, Wikipedia
- Trusted Execution Environment (TEE) - definitive - REE Rich Execution Environment, Rich Android/Operating System - secure enclave - Trusted Applications - smartphones, mobiles
- Trusted execution environment - TEE - Secure area of main processor, isolated execution environment - Premium Content Protection/DRM, authentication, secure modular programming - AMD Platform Security Processor PSP, AMD Secure Execution Environment, ARM TrustZone, Intel Trusted Execution Technology/SGX/Silent Lake, RISC-V MultiZone Security Trusted Execution Environment - enclave
- hardware - What are the differences between HSM and SE? TPM - PKCS #11 - smartcard, sim, contactless - arm trustzone, sgx
- Ldapwiki: Secure Enclave - Apple iOS - ARM TrustZone
- Why Secure Enclave Is Winning Over The Security World - TEE
- What Is the Secure Enclave? | Hacker News
- Introduction to Trusted Execution Environment: ARM's TrustZone - TEE
- Crypto-Bootloader (CryptoBSL) for MSP430FR59xx and MSP430FR69xx MCUs - Texas Instruments
- Demystifying-The-Secure-Enclave-Processor
- Towards an Open-Source Secure Enclave - Oasis Labs - Medium
- Why Enclaves are Taking over the Security World - TEE, ARM’s TrustZone, AMD’s Secure Encrypted Virtualization (SEV), and Intel’s Trusted Execution Technology (TXT) and Software Guard Extensions (SGX).
- Keystone | An Open Framework for Architecting TEEs - Trusted Execution Environments
- Brief Introduction to Secure Cryptographic Enclaves
- Demystifying the Secure Enclave Processor - iOS, SEPOS, Secure Enclave Processor SEP, exploitation
- What Is Apple’s “Secure Enclave”, And How Does It Protect My iPhone or Mac?
- Hacking in Darkness: Return-oriented Programming against Secure Enclaves - ROP
- Flaws in Smart Irrigation Systems Expose Water Utilities to Botnet-Grade Attacks
Embedded_Boards_Hacking
RaspberryPi
- opensource.com/article/17/3/iot-security-raspberry-pi?sc_cid=70160000001273HAAQ
- Secure Kali Pi 2018 | Kali Linux
- Single Board Computer SBC: Penetration Testing with Raspberry Pi (W42)
Firmwares_Attacks
Secure_Boot
- SecureBoot - Debian Wiki
- The whys and hows of secure boot - Embedded.com
- SecureBoot/Testing - Debian Wiki
- Page not found
- SecureBoot - FreeBSD Wiki
- Secureboot - Fedora Project Wiki
- UEFI/SecureBoot/DKMS - Ubuntu Wiki
- Secure Boot · Security-Onion-Solutions/security-onion Wiki · GitHub
- Secure Boot - ArchWiki
- UEFI/SecureBoot - Ubuntu Wiki
- Secure boot and device encryption overview - Windows drivers | Microsoft Docs
- High Assurance Boot - Variscite Wiki
- hardware - Securing the bootloader - Information Security Stack Exchange
- Notes on dual-booting Linux with BitLocker Device Encryption and Secure Boot | Ctrl blog
- Secure Boot, Yay or Nay? : archlinux
- SecureBootloadersST_RevA0 - SecureBootloadersST_RevA0.pdf
- Take Control of Your PC with UEFI Secure Boot | Linux Journal
- PureBoot, the High Security Boot Process – Purism
- AN4581 - AN4581.pdf
- Secure Boot - Funtoo
- SecureBoot and Encryption
- dm-crypt/Specialties - ArchWiki
- Cybersecurity Researchers Spotted First-Ever UEFI Rootkit in the Wild
- How to Update Your BIOS to Protect Against Vulnerabilities
- Firmalware - Malware attacks on firmware - secure coding, bootstrap loader security, firmware update distribution security, encryption scheme for update distribution, encryption keys protection, lock bits -
Computer_Accessories
- How to Secure your Wireless Mouse and Keyboard from being Hacked
Vehicles_Pwning
Car_Pwning
- Hackers Can Steal a Tesla Model S in Seconds by Cloning Its Key Fob | WIRED
- Researchers demonstrate how to unlock Tesla wireless key fobs in 2 seconds
- Mercedes adds fingerprint support to its otherwise-terrible app
- Tesla Model S Hack Could Let Thieves Clone Key Fobs to Steal Cars
- Fast, Furious and Insecure: Passive Keyless Entry and Start in Modern Supercars | COSIC
- Unpatchable Flaw in Modern Cars Allows Hackers to Disable Safety Features
- Gone in Seconds: Hackers Steal Mercedes Car without Key
- It’s 2017 and Hayes AT modem commands can hack luxury cars • The Register
- Cybersecurity concerns may stop consumers from purchasing a connected car - Help Net Security
- Watch thieves steal keyless Mercedes within 23 seconds
- Chinese Hackers Find Over a Dozen Vulnerabilities in BMW Cars
- BMW cars found to contain more than a dozen flaws - BBC News
- Researchers find critical security flaws in popular car models
- ECU tune and reverse engineering - firmware, embedded - hacking, analysis - Engine control unit - car hacking
- The Car Hacker’s Handbook - A Guide for the Penetration Tester
- Car Hackers Mess With Speedometers, Odometers, Alarms and Locks - Slashdot
- Introductory to EEPROM (AEE101) - LSC - leading security products
- A Deep Flaw in Your Car Lets Hackers Shut Down Safety Features | WIRED
- eeprom register car at DuckDuckGo
- How To Fight Odometer Fraud
- Volkswagen CAN BUS Gaming | Hackaday.io
- Car to Arduino Communication: CAN Bus Sniffing and Broadcasting With Arduino: 4 Steps
- CAN Bus and OBD II Explained For Dummies, with Examples of how CAN Bus and OBD II Work!
- a complete guide to hacking your vehicle bus on the cheap & easy – part 2 (interpreting the data) | theksmith
- Since when is CAN bus mandatory for new vehicles? - Motor Vehicle Maintenance & Repair Stack Exchange
- Hack Your Vehicle CAN-BUS With Arduino and Seeed CAN-BUS Shield: 6 Steps
- Is it possible to change the odometer reading on a car mechanically? If not, what mechanisms are in place to prevent that from happening? - Quora
- Blockchain a Solution to Prevent Odometer Tampering - BitCoin News
- Is it possible to reverse/decrease the number of miles driven on a car? If yes, how? - Quora
- How blockchain can help to prevent odometer fraud - IoTool
- How Blockchain can help to prevent odometer fraud
- Tractor-Hacking Farmers Are Leading a Revolt Against Big Tech's Repair Monopolies - Motherboard
Owning_Traffic_Devices
- Hacking Traffic Lights is Amazingly Really Easy
- Someone hacked this traffic sign with anti-Trump messages
Voting_Machines
- I Bought Used Voting Machines on eBay for $100 Apiece. What I Found Was Alarming | WIRED
- Voting Machines Are Still Absurdly At Risk | WIRED
- Votes in 18 nations 'hacked' in last year - BBC News
- Proof It's Possible to Hack German Elections; Hackers Tamper with Voting-Software
- The US Should Modernize Election Systems to Prevent Hacking | WIRED
- Hackers breach dozens of voting machines brought to conference | TheHill
Smart_Homes_Security
- UK seeks to secure smart home gadgets - BBC News
Kodi
- What is Kodi? Here is the online security guide for watching content with it
- 7 Security and Privacy Issues to Consider With a Kodi Media Box
- 3 Reasons Why You Should Be Using a VPN With Kodi
- Kodi users on Windows and Linux infected with cryptomining malware - TechSpot
- osmc security at DuckDuckGo
- osmc vulnerabilities at DuckDuckGo
- 'Dolphin' attacks fool Amazon, Google voice assistants - BBC News
- Researchers hack vacuum cleaner; turn it into perfect spying device
- Bluetooth Hack Affects 20 Million Amazon Echo and Google Home Devices
- Dojo brings critical security to smart home automation
- Turning an Amazon Echo Into a Spy Device Only Took Some Clever Coding | WIRED
- Snowden-Backed App 'Haven' Turns Your Phone Into a Home Security System | WIRED
- How To Turn Your Android Device Into A Security Camera
- Bookmarks Toolbar | Computer_Science | Cyber_security | Cyber-Security_and_Hacking_Learning | Web_Security | Platforms_Hacking | Kodi | kodi privacy at DuckDuckGo
HealthCare_Devices_Security
- FDA Recalls Nearly Half a Million Pacemakers Over Hacking Fears
- Hackers Can Remotely Access Syringe Infusion Pumps to Deliver Fatal Overdoses
- Ethical hackers to boost NHS cyber-defences - BBC News
Nuclear_Equipment
- Three Vendors Decline to Patch Vulnerabilities in Nuclear Radiation Monitors
Power-Energy_Grid_Hacking
- DARPA's Hail Mary Plan to Restart a Hacked US Electric Grid | WIRED
- People Are Recklessly Speculating That the Massachusetts Gas Explosions Were a Stuxnet-Related Hack - Motherboard
- Critical Flaws Found in Solar Panels Could Shut Down Power Grids
- Power firms alerted on hack attack scenarios - BBC News
- Dangerous Malware Discovered that Can Take Down Electric Power Grids
Weapon_Hacking
- Smart gun hacked with cheap magnet - BBC News
Printers
- Hackers can conduct DoS attacks Using Flaw in Brother Printers
- Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now
Smart_Locks_And_Safes_Cracking
- Faulty Firmware Auto-Update Breaks Hundreds of 'Smart Locks'
- The “world’s worst” smart padlock – it’s EVEN WORSE than we thought – Naked Security
- Smart lock can be hacked 'in seconds' - BBC News
CCTV-Security_Cameras_Attacks
- how to scramble security cameras - Google Search
- Two Popular IP Cameras Riddled With Vulnerabilities | Threatpost | The first stop for security news
- This is How CIA Disables Security Cameras During Hollywood-Style Operations
- Over 55,000 security camera DVRs are vulnerable to an exploit so simple it fits in a tweet – Boing Boing
- Black Hat 2013 - Exploiting Network Surveillance Cameras Like a Hollywood Hacker - YouTube
Owning_Robots
Drones_Hacking
- DJI Spark hijacking – Embedi
Gaming_Machines_Hacking
Playstation_4
- Text Bomb Causing PS4 to Crash
Nintendo_Switch
- Article · iDaN5x/Switcheroo Wiki · GitHub
- PlayStation 4 hacked to run PS2 emulation & homebrew software
- Hackers Get Linux Running On Switch And Claim Nintendo Can't Patch The Exploit - Nintendo Life
- All Nintendo Switch Consoles Contain Unpatchable Chip-Level Flaw
- Are video game consoles embedded systems? : embedded
- PlayStation (video game console): What OS embedded in play station machine? - Quora
- New Rapidly-Growing IoT Botnet Threatens to Take Down the Internet
- Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk
- How to Detect BlueBorne Vulnerable Devices & What It Means « Null Byte :: WonderHowTo
- Cisco: Most IoT projects are failing due to lack of experience and security | ZDNet
- Homeland Security Hackers Remotely Hack Boeing 757
- Connected toys have ‘worrying’ security issues - BBC News
- Drone maker DJI in cyber-security row over bug bounty - BBC News
- Is Government Regulation Needed to Improve Cyber-Security?
- Security vs. convenience? IoT requires another level of thinking about risk | Ars Technica
- How hackers can compromise your computer monitor
- Smart Devices Can Be Hijacked to Track Your Body Movements And Activities Remotely
- Hackers Could Easily Take Remote Control of Your Segway Hoverboards
- Vulnerabilities in Pre-Installed Software expose Dell Systems to hackSecurity Affairs
- Zero-Day Remote 'Root' Exploit Disclosed In AT&T DirecTV WVB Devices
- IoT Radio Communication Attack – Part Two
- Backdoor Account Removed from Western Digital NAS Hard Drives
- Joykill: Previously Undisclosed Vulnerability Endangers User Data | Hackaday
- A New Way to Track Down Bugs Could Help Save IoT | WIRED
- Some Basic Rules for Securing Your IoT Stuff — Krebs on Security
- Warnings over net-connected Christmas gadgets - BBC News
- Microsoft's Project Sopris Could Secure the Next Generation of IoT | WIRED
- Internet of Things Security (W35) - Pentestmag
- raw.githubusercontent.com/pedrib/PoC/master/advisories/asuswrt-lan-rce.txt
- Code-execution flaws threaten users of routers, Linux, and other OSes | Ars Technica
- GitHub - evilsocket/bleah: A BLE scanner for "smart" devices hacking.
- Cisco drops a mega-vulnerability alert for VPN devices | Ars Technica
- That mega-vulnerability Cisco dropped is now under exploit | Ars Technica
- Smart device security guidelines 'need more teeth' - BBC News
- Microsoft built its own custom Linux OS to secure IoT devices
- An Elaborate Hack Shows How Much Damage IoT Bugs Can Do | WIRED
- A Long-Awaited IoT Crisis Is Here, and Many Devices Aren't Ready | WIRED
- The Internet of Things Isn't Just About Networked Juicers | Privacy, Health, & Technology
Storages_Pwning
Hard_Disks_Hacking
- Hard Disk Firmware Hacking (Part 1) - HDD
TV_Decoders_Set-Top-Boxes_Hacking
- Unlock Startimes, Gotv, Digital TVs, Satellite Channels - Pay TV Hacking, decoder/set-top-box/décodeur - DTB firmware reversing/reverse engineering - flashing, upgrade, patching
- [CB16] DVB-T Hacking by Amihai Neiderman - YouTube
- Card sharing - hacking décodeurs TV, set top box/decoders - Pay Tv conditionnal access hacking
Banking-Financial-Payment_Systems_Security
Payment_Cards_Security
Fundamentals
- EMV - Europay, Mastercard, and Visa - Wikipedia
- Personal identification number - Wikipedia
- What is card verification value (CVV)? - Definition from WhatIs.com
- what can be done with card secret pin - Google Search
- credit card - Is a 3 or 4 digit CVV enough for online transactions? - Information Security Stack Exchange
- What do the numbers on my credit/debit card mean? - Personal Finance & Money Stack Exchange
- what can be done with card secret pin - Google Search
- what does Visa card mean - Google Search
- hacking Visa pin - Google Search
- EMV's TVR - Terminal verification results - Wikipedia
PCI_DSS_Standard
- Payment Card Industry Data Security Standard - PCI-DSS - Wikipedia
- ISO/IEC 7812 - Wikipedia
Contactless_Payment_Hacking
- Contactless payment - Wikipedia
- How safe is my contactless bank card? - Information Security Stack Exchange
- authentication - NFC contactless payment security - Information Security Stack Exchange
- How Secure Are Contactless Payments? - Infosecurity Magazine
- (PDF) Security Issues with Contactless Bank Cards
- NFC Contactless Payment – PCI / EMV Security Standards – Xorlogics
- GitHub - blunden/EMVConsole: A python application for communicating with an EMV payment smart card
- GitHub - blunden/TVRDecoder: Android app for decoding the TVR and TSI status codes found on many credit card reciepts
- mitm attack against payment card verification at DuckDuckGo
- How to Get Unlimited Free Trials Using a "Real" Fake Credit Card Number « Null Byte :: WonderHowTo
- Forever 21 Warns Shoppers of Payment Card Breach at Some Stores
- Credit card skimmers: How you can scam the skimmers - CNET
- This Free App Can Protect You From Hidden Credit Card Skimmers
- MasterCard launches Credit Card with Built-In Fingerprint Scanner
- Whatever you do, don’t give this programmable payment card to your waiter | Ars Technica
Automatic_Teller_Machines
- First ‘Jackpotting’ Attacks Hit U.S. ATMs — Krebs on Security
- risks of communicating iban number at DuckDuckGo
- Bankers Are Hiring Cyber-Security Experts to Help Get Deals Done - Bloomberg
- New IcedID Banking Trojan Discovered
- BankBot Returns On Play Store – A Never Ending Android Malware Story
- Banking Trojan Gains Ability to Steal Facebook, Twitter and Gmail Accounts
- Banks Around the World Hit with Repeated DDoS Attacks! « Null Byte :: WonderHowTo
- You can now buy ATM malware on Dark Web for $5000
- New Banking Malware Reverts To Ransomware When You Try To Remove It
- Red Alert 2.0: New Android Banking Trojan for Sale on Hacking Forums
- WannaCry-Stopping Hacker MalwareTech Charged With Helping Write Kronos Banking Trojan | WIRED
- WannaCry Inspires Banking Trojan to Add Self-Spreading Ability
- Dangerous Mobile Banking Trojan Gets 'Keylogger' to Steal Everything
- Security Flaw Left Major Banking Apps Vulnerable to MiTM Attacks Over SSL
- Hackers stole $800,000 from ATMs using Fileless Malware
- NatWest bank spat prompts web security changes - BBC News
- "I Just Pressed Shift Key 5 Times" — User Gains Full Access On A Windows XP ATM Machine
- hackread.com/jackpotting-attacks-hits-us-atms-spit-out-cash-in-seconds/
- "Wire bank transfer" malware phishing scam hits SWIFT banking system
- Critical Oracle Micros POS Flaw Affects Over 300,000 Payment Systems
- International Bank Account Number - Wikipedia
- International Bank Account Number — Wikipédia
- Virement à un nouveau bénéficiaire : pourquoi votre banque vous impose (encore) un délai ?
AI_Tools_And_Techniques
- This is how artificial intelligence will become weaponized in future cyberattacks | ZDNet
Pwning_Artificial_Intelligence
- Google bans birds on bikes from algorithm contest - BBC News
- How Adversarial Attacks Work
- Even Artificial Neural Networks Can Have Exploitable 'Backdoors' | WIRED
- Self-Driving Cars Can Be Hacked By Just Putting Stickers On Street Signs
- AI Has a Hallucination Problem That's Proving Tough to Fix | WIRED
- Malware Detection in Executables Using Neural Networks | Parallel Forall
- darkreading.com/threat-intelligence/ai-in-cybersecurity-where-we-stand-and-where-we-need-to-go/a/d-id/1330787
- How Machine Learning And Other Tech Trends Will Disrupt Cyber Security In 2018
- How artificial intelligence stopped an Emotet outbreak – Microsoft Secure
- AI ripe for exploitation, experts warn - BBC News
- PenTest: Machine Learning, Deep Learning and Cybersecurity - Pentestmag
Cryptocurrency-Blockchain_Security
Wallets
- A 15-year-old said he discovered vulnerability in hardware wallet
- John McAfee backed Bitfi wallet pwned again
- Mixin Messenger - An open source cryptocurrency wallet with Signal messaging | Product Hunt
- Storing bitcoins - securing wallets - Bitcoin Wiki
- Bitcoin fanatics are storing their cryptocurrency passwords in DNA - CNET
- Bitcoin Core Software Patches a Critical DDoS Attack Vulnerability
Cryptojacking
- Shocking: Hackers using Googlebots in cryptomining malware attacks
- Websites use your CPU to mine cryptocurrency even when you close your browser | Ars Technica
- Cryptojacking Lets Strangers Mine Cryptocurrency With Your Browser | WIRED
- Cryptocurrency Mining Scripts Now Run Even After You Close Your Browser
- The Pirate Bay Caught Running Browser-Based Cryptocurrency Miner
- Weeks Before WannaCry, Cryptocurrency Mining Botnet Was Using Windows SMB Exploit
- Starbucks cafe's wi-fi made computers mine crypto-currency - BBC News
- Hackers Targeting Servers Running Database Services for Mining Cryptocurrency
- CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCode - Blog
- securityaffairs.co/wordpress/67503/hacking/blackberry-mobile-website-hacked.html
- Now even YouTube serves ads with CPU-draining cryptocurrency miners | Ars Technica
- Ad Network Uses DGA Algorithm to Bypass Ad Blockers and Deploy In-Browser Miners
- DDG, the second largest mining botnet targets Redis and OrientDB serversSecurity Affairs
- Protect your site from Cryptojacking with CSP + SRI
- MS Word Maybe Used for Cryptojacking Attacks
- How to Defend Servers Against Cryptojacking
- How To Block Cryptocurrency Mining In Your Web Browser
- The Pirate Bay: We mine Monero from your CPU, install Adblocker or leave
- how to make sure my pc isn't used for mining - Google Search
- CoffeeMiner: Hacking WiFi to inject cryptocurrency miner to HTML requests - ArnauCode - Blog
Blockchains_Attacks
- H9 W39 Attack and Defence in Blockchain Technologies - Online Course Intro on Vimeo
- Gladius Shows Promise in Utilizing Blockchain Tech to Fight Hackers
- Blockchain : une alternative sérieuse au couple identifiant/MdP ? Oui, selon certains experts
- Blockchain for Identity: 6 Hot Projects - BankInfoSecurity
- Bush Security Advisor Warns Against Blockchain Cold War - CoinDesk
- Online Course: Attack and Defence in Blockchain Technologies (W39)
- double spendibg attack Cryptocurrency at DuckDuckGo
- https://duckduckgo.com/?q=51+percent+hashing+attack+on+blockchain&t=ffab&ia=web
- https://duckduckgo.com/?q=51+percent+hashing+attack+wikipedia&t=ffab&ia=web
- https://bitcoin.stackexchange.com/questions/658/what-can-an-attacker-with-51-of-hash-power-do
- https://duckduckgo.com/?q=majority+attack+wikipedia&t=ffab&ia=news
- https://en.bitcoin.it/wiki/Majority_attack
- Flood attack - blockchain - Bitcoin Wiki
- Double-spending - flaw in digital cash schemes - equivalent to the fiat counterfeit money - centralized vs decentralized - cryptocurrency/blockchain, bitcoin, PoW Proof of Work - Fundamental cryptographic techniques to prevent double-spending, while preserving anonymity in a transaction, are blind signatures and, particularly in offline systems, secret splitting - Majority/51% attack
- Security vulnerabilities of cryptocurrency exchanges
- Hacker Uses A Simple Trick to Steal $7 Million Worth of Ethereum Within 3 Minutes
- A major vulnerability has frozen hundreds of millions of dollars of Ethereum | TechCrunch
- Tether crypto-currency operator reports $31m raid - BBC News
- Tether Hacked — Attacker Steals $31 Million of Digital Tokens
- Tether Claims $30 Million in US Dollar Token Stolen - CoinDesk
- Millions Gone? Broker Takes Fire for Bitcoin Cash Freeze - CoinDesk
- Cryptographic vulnerabilities in IOTA – Neha Narula – Medium
- Hacker Takes Over Coinhive DNS Server After Company Reuses Old Password
- how to make sure my pc isn't used for mining - Google Search
- Hackers Using Default SSH Creds to Take Over Ethereum Mining Equipment
- Here’s How Hackers Can Hijack Your Online Bitcoin Wallets
- GitHub - mit-dci/tangled-curl: IOTA's hash function curl is broken
- How Hackers Cash Out Thousands of Bitcoins Received in Ransomware Attacks
- Largest Cryptocurrency Exchange Hacked! Over $1 Million Worth Bitcoin and Ether Stolen
- Lost Bitcoins: 4 Million Bitcoins Gone Forever Study Says | Fortune
- A Piece of DNA Contained the Key to 1 Bitcoin and This Guy Cracked the Code - Motherboard
- Bitcoin exchange Youbit shuts after second hack attack - BBC News
- BlackWallet hacked: Hackers replace DNS server, steal $400k in Stellar
- Tor-to-Web Proxy Caught Replacing Bitcoin Addresses on Ransomware Payment Sites
- Scammers become the scammed: Ransomware payments diverted with Tor proxy trickery • The Register
- A 200-Year-Old Idea Offers a New Way to Trace Stolen Bitcoins | WIRED
Quantum_Techniques_and_Tools
- Laws of Physics Say Quantum Cryptography Is Unhackable. It's Not | WIRED
- Quantum Computing Must Be a National Security Priority - Scientific American Blog Network
- BlackBerry races ahead of security curve with quantum-resistant solution – TechCrunch
- Countdown to the Crypto-Apocalypse - Motherboard
- (in)Secure: Interview With Quantum Xchange’s John Prisco | Digital Trends
- The Quantum Hacker Lab – Quantum Bits – Medium
- Why the NSA moving away from Suite B cryptography due to quantum computers makes total sense
- Why don’t post-quantum security standards exist yet?
- Break RSA encryption with this one weird trick – Quantum Bits – Medium
- Post-Quantum Cryptography at Google – Quantum Bits – Medium
- Quantum cryptography - key exchange, quantum key distribution
- How secure will our data be in the post-quantum era?
- brute force combinatorics quantum computing at DuckDuckGo
- Post-quantum cryptography - Wikipedia
- cryptography - What kinds of encryption are _not_ breakable via Quantum Computers? post-quantum cryptography - In public key cryptography,three schemes are quantum-secure: Lattice based cryptography like NTRUEncrypt based on lattices, code-based cryptography like McEliece cryptosystem based on information theory, multivariate cryptography like Hidden Fields Equations - Information Security Stack Exchange
- The Clock Is Ticking for Encryption | Computerworld
- Quantum Computing vs Encryption: A Battle to Watch Out for
- Quantum Computing vs. Conventional Cryptography - Strategic Finance
- Provably secure and high-rate quantum key distribution with time-bin qudits | Science Advances
- Quantum encryption is now fast enough for voice calls
- High-speed quantum encryption may help secure future internet: study - Xinhua | English.news.cn
- How Cryptographers Will ‘Fight Quantum With Quantum’ - Motherboard
- Researchers Are Now Close To "Quantum Encrypted Internet"
- Preparing for the Quantum Computing Future with Open-Source Software
- Chinese satellite sends 'hack-proof' message - BBC News
- High-speed quantum encryption may help secure the future internet
- New nanomaterial, quantum encryption system could be ultimate defenses against hackers | KurzweilAI
- Quantum Computing Is the Next Big Security Risk | WIRED
- Quantum Video Call Displays the Future of Secure Communication
- New quantum repeater paves the way for long-distance big quantum data transmission
- Chinese satellite uses quantum cryptography for secure video conference between continents - MIT Technology Review
- Forging a quantum leap in quantum communication
- why will not quantum computing break symmetric encryption at DuckDuckGo
- The quantum meltdown of encryption – TechCrunch
- Quantum computers pose a security threat that we’re still totally unprepared for - MIT Technology Review
Secure_Software_Development-Secure_Coding
DevSecOps
- 5 ways DevSecOps changes security | Opensource.com
- Why DevSecOps matters to IT leaders | The Enterprisers Project
- CSCI 4971 - RPISEC Welcome
- opensource.com/article/18/1/new-paradigm-cybersecurity
- GitHub - devsecops/awesome-devsecops: An authoritative and definitive list of awesome devsecops tools with the help from community experiments and contributions.
- SEI CERT C Coding Standard - security controls - secure coding - PDF version at resources.sei.cmu.edu/downloads/secure-coding/assets/sei-cert-c-coding-standard-2016-v01.pdf - Rules for Developing Safe, Reliable, and Secure Systems (2016 Edition)
- Guidance to avoiding vulnerabilities in programming languages–Part 1: Language independent guidance - definitive high-level secure coding concepts
- Programming Language Vulnerabilities - secure coding - C/C++, Python, Ada, Ruby - ISO/IEC JTC1/SC22/WG23
- CWE - 2011 CWE/SANS Top 25 Most Dangerous Software Errors - Use of Hard-coded Credentials, key/password/credentials storage
- Secure Software Development | Pluralsight
- These five programming languages have flaws that expose apps to attack | ZDNet
- Secure Programming HOWTO - Information on Creating Secure Software
- Military Embedded Systems - cyberwarfare
- Justifiably taboo: Avoiding malloc()/free() APIs in military/aerospace embedded code - Military Embedded Systems - secure coding - cyberwarfare - Stack-based algorithm: Allocate and rewind memory - The multithreaded, multicore allocation challenge
- Secure programming with the OpenSSL API – secure coding
- These are the most insecure programming languages | secure coding
- CERT C Coding Standard - secure coding - The SEI CERT C Coding Standard is a software coding standard for the C programming language, developed by the CERT Coordination Center to improve the safety, reliability, and security of software systems - Guidelines in the CERT C Secure Coding Standard are cross-referenced with several other standards including Common Weakness Enumeration (CWE) entries and MISRA
- Better Software Through Secure Coding Practices
- SEI CERT C++ Coding Standard (2016 Edition) - sei-cert-cpp-coding-standard-2016-v01.pdf
- The Secure Developer - Ep. #35, Secure Coding in C/C++ with Robert C. Seacord of NCC Group - YouTube
- Secure Programming Practices in C++ - Patricia Aas - YouTube
- CERT Secure Coding C and C++ - Robert C. Seacord
- Secure coding - What is it all about? - GeeksforGeeks
- Secrets | Python module to Generate secure random numbers - secure RNG, CSPRNG
- SEI External Wiki Home - Secure Coding - SEI CERT C Coding Standard - SEI CERT C++ Coding Standard - SEI CERT Java Coding Standard - SEI CERT Android Coding Standard - SEI CERT Perl Coding Standard
- New C++ Secure Coding Standard - Discussion on SEI CERT Secure Coding - wiki.sei.cmu.edu/confluence/ - unsigned integer overflow - select, poll
- SEI CERT C++ Coding Standard - SEI CERT C++ Secure Coding Standard - PDF version at resources.sei.cmu.edu/downloads/secure-coding/assets/sei-cert-cpp-coding-standard-2016-v01.pdf
- SDB:Secure coding checklist: C and C++ - openSUSE Wiki
- How to Write a Secure Code in C/C++ Programming Languages - Pentestmag
- Cybersecurity C and C++ Secure Coding - LAB.02.secure-coding.pdf
- Secure code development in PHP (W49) - Hakin9 - IT Security Magazine - web security
- Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong) - defprogramming.pdf - secure coding - safe programming - good practices in compilation
- Definitions - SEI CERT C Coding Standard - jargon, terminology - definitive list - re entrancy, re entrant
- CC. Undefined Behavior - SEI CERT C Coding Standard - definitive list - secure coding
- Software Safety vs Security — code safety vs security - safe code/coding vs secure code/coding -
- Secure Coding: A Practical Guide
- Safe Coding Practices - secure coding
- ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225.pdf
Composing_pentesting_reports
- The Art of Writing Penetration Test Reports
- The Top 5 Penetration Testing Tools and Their Reporting Features
- Reporting - OWASP
- Report Template
Breaking_physical_locks
- How to Pick a Lock - YouTube
- Crack Any Master Combination Lock in 8 Tries or Less Using This Calculator « Null Byte :: WonderHowTo
- How to Create a Bump Key to Open Any Door « Null Byte :: WonderHowTo
- Lockpicking club · AnarchoTechNYC/meta Wiki · GitHub
Hacking_Challenges
- Definitive list of awsome hacking/security resources - InfoSec · AnarchoTechNYC/meta Wiki - antifa - Vulnerable/hackable/pwnable/pen-testable targets - Hacking Labs - Hacking Challenges/Competitions, CTFs - Anti-Reversing/Reverse Engineering Techniques/Mitigation
- Silicon Valley firms compete to hack R2-D2 - BBC News
- Masquerade VM Walkthrough Part 1 | linkcabin
- Malware-Traffic-Analysis.net - 2017-12-15 - Traffic analysis exercise - Two pcaps, two emails, two mysteries!
- How to solve the Malwarebytes CrackMe: a step-by-step tutorial | Malwarebytes Labs
- Digital fight training · AnarchoTechNYC/meta Wiki
- Hack the Depth VM (CTF Challenge)
- Updated Hacking Challenge Site Links
- Solving the White Rabbit CrackMe – Alex Skalozub – Medium
- [PentesterLab] Our exercises
- Exploit Exercises
- GitHub - RPISEC/HackTheVote: Handouts, setup scripts, sources, and solutions for challenges from Hack The Vote
- Capture the Flag: It's a game for hack...I mean security professionals
- CTFtime.org / All about CTF (Capture The Flag)
- GitHub - facebook/fbctf: Platform to host Capture the Flag competitions
- Capture the Flag
- picoCTF - CMU Cybersecurity Competition
- GitHub - RomaniukVadim/wargaming-challenges: Wargaming challenges write-ups
- Hack.me · The house of rising sandbox
Hacking_Bounties
- Steam bug allowed unlimited free downloads - BBC News
- Coinbase, EOS, and Stellar Pay Out $60k in Bug Bounties to White Hat Hackers This Week Alone • Live Bitcoin News
Bounty_Targets
- Stripe - Online payment processing for internet businesses | France
- Facebook Broadens Its Bug Bounty to Include Third-Party Apps | WIRED
- Parse + Open Source = ❤️
- Presentation Software | Online Presentation Tools | Prezi
- Yahoo
- Deutsche Telekom: Deutsche Telekom: Home
- Bug Bounty - IDA Pro HexRay
- Get paid up to $40,000 for finding ways to hack Facebook or Instagram accounts - Hacking Bounty
- Researcher Resources - How to become a Bug/Hacking Bounty Hunter - Security Research - definitive resources/forums/tutorials list
Refs
- Bug/Hacking Bounty Toolkit – BugBountyHunting – Medium
- Bug/Hacking Bounty Programs: A Quick Guide – Threat Intel – Medium
- Bug Bounty, Vulnerability Coordination - HackerOne
- Zopim: Bug Bounty Program - Get Rewards through HackerOne
- Crowdfense
- Top 30 Bug/Hacking Bounty Programs in 2018
- Welcome to Web Application Security Research: List of Bug/Hacking Bounty Programs
- White Hat Hacking: Hack the Pentagon? « Null Byte :: WonderHowTo
- Hackers are making big bucks working for the good guys | New York Post
- Get $1M for reporting zero-day flaws in Tor to "help Govt fight crime"
- Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments - Hacking Bounty
- Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards
- A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploits - Hacking Bounty
- A superstar Chinese hacker just won $112,000 from Google, its largest bug bounty ever
- Chromebook exploit earns researcher second $100k bounty – Naked Security
- #BugBounty — “I don’t need your current password to login into your account” - How could I…
- Reflected Client XSS Amazon.com – Jonathan Bouman – Medium
- Rewards of Up to $500,000 Offered for FreeBSD, OpenBSD, NetBSD, Linux Zero-Days
- Shadowy Hackers Accidentally Reveal Two Zero-Days to Security Researchers
- Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks
- Unpatched Remote Code Execution in Reprise License Manager
- Intel Corporation - Bug Bounty Program | HackerOne
- The Department of Defense's Bug Bounty Program Has Flagged Thousands of Vulnerabilities
- Zero Day Initiative - hacking bounty platform
- ZERODIUM - The Leading Exploit Acquisition Platform - hacking bounty platform
- intigriti - ethical hacking and managed bug bounty platform
- ARK Development and Security/Hacking Bounty Program
- GitHub - streaak/keyhacks: Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
- Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer
- Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services
- Tesla's software bug bounty is going to the big leagues with Pwn2Own - Roadshow
- EdOverflow | “CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter
- Bug bounty: Hack Tesla Model 3 to win your own Model 3
- 19-year-old makes millions from ethical hacking - bug bounty, csrf, idors | ZDNet
- Drone maker DJI in cyber-security row over bug bounty - BBC News
- Facebook Bug Bounty Program Makes Biggest Reward Payout Yet | WIRED
- Yet another talk on bug bounty
- Get SSH username & Password For Any Server easily with Brute Force Attack – bug bounty hunting
- EP3: How to be a paid bug bounty hunter (EN) - YouTube
- Facebook Bug Bounty Guide | API testing - YouTube
- Bug Bounty Hunting Methodology v2 - Jason Haddix from Bugcrowd's LevelUp 2017 - YouTube
- Bug Bounty 101 - How To Become A Bug Hunter - Bug Bounty Talks - YouTube
- About a Sucuri RCE...and How Not to Handle Bug Bounty Reports - RCE Security
- Singapore government to run another bug bounty | ZDNet
- Home | Hacker101 - Capture the Flags - challenges
- Bug bounty is a joke - phwd - Medium
- Getting Paid for Breaking Things: The Fundamentals of Bug Bounty
- Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum
- Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum
- Payouts: what's a bug actually worth these days? - Starter Zone - Bugcrowd Forum
Interviews_Questions
- Top 50 Information Security Interview Questions [Updated for 2017]
- Reverse Engineering challenges
- The Cryptopals Crypto Challenges
- [Write-up] Mr Robot - Christophe Tafani-Dereeper
- Wargame (hacking) - Wikipedia
- OverTheWire: Wargames
- io.netgarage.org
- RPISEC - Bit Tripping: Blackbox: A Cryptography Wargame
- SmashTheStack Wargaming Network
- UCR CS165 - Reverse Engineering Challenges
- Root Me : Hacking and Information Security learning platform] - hacking challenges resolving
- crackme - Crack Me Material - challenges - Reverse Engineering Stack Exchange
- sploitF-U-N - writeups, challenges, CTFs
- Techorganic – Hacking challenges, writeups, CTFs
- DEFINITIVE - Tools and resources to prepare for CTFs. – CTF for noobs - disassemblers, debuggers, reverse engineering - hacking challenges
- CTF for noobs - definitive resources, writeups for hacking challenges
- DEFINITIVE - CTFs, Hacking challenges preparation - malware analysis
Actual_Hacks
Famous_Hacks-Malware_Outbreaks
Attacks-Malware_Outbreaks
Torii_2018
- New Iot Botnet Torii Uses Six Methods for Persistence, Has No Clear Purpose
Stuxnet_Hack-2003
- Stuxnet - Wikipedia
- What the Heck Was Stuxnet!? « Null Byte :: WonderHowTo
- Mirai Variant 'OMG' Turns IoT Devices into Proxy Servers for Cryptomining
- stuxnet natanz profinet - Google Search
HNS_Botnet-2018
- New HNS botnet has already compromised more than 20,000 IoT devices - Security AffairsSecurity Affairs
- HNS Evolves From IoT to Cross-Platform Botnet
Night_Dragon_Operation-2006
- Night Dragon Operation - Wikipedia
- Night Dragon | Intel Security
Operation_Aurora-2010
- Operation Aurora - Wikipedia
Shamoon-2012
- Shamoon wiper malware returns with a vengeance | Ars Technica
Wannacry-2017
- Hackers Behind WannaCry Ransomware Withdraw $143,000 From Bitcoin Wallets
- An NSA-derived ransomware worm is shutting down computers worldwide | Ars Technica
- WannaCry Kill-Switch(ed)? It’s Not Over! WannaCry 2.0 Ransomware Arrives
- WannaCry Ransomware That's Hitting World Right Now Uses NSA Windows Exploit
- Google Researcher Finds Link Between WannaCry Attacks and North Korea
- WannaCry Ransomware Decryption Tool Released; Unlock Files Without Paying Ransom
- Coding mistakes in WannaCry Ransomware may let you get your files back » TechWorm
- Cyber-attack: US and UK blame North Korea for WannaCry - BBC News
- North Korean Cyber-Attacks and Collateral Damage | AlienVault
- wannacry-hero-marcus-hutchins-new-legal-woes-white-hat-hackers
NotPetya_2017
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History
- The Untold Story of NotPetya, the Most Devastating Cyberattack in History | WIRED
- New TeleBots backdoor links Industroyer to NotPetya for first time
- Ukranian company that spread Petya could face criminal charges for vulnerability - The Verge
- How hackers are targeting the shipping industry - BBC News
- Hackers Linked to NotPetya Ransomware Decrypted a File for Us - Motherboard
- Latest malware attack exposes cybersecurity weaknesses | TheHill
- Tuesday’s massive ransomware outbreak was, in fact, something much worse | Ars Technica
- Global ransomware attack causes turmoil - BBC News
- NotPetya attack: Maersk reinstalled 45,000 PCs, 2,500 apps & 4,000 servers
- UK and US blame Russia for 'malicious' NotPetya cyber-attack - BBC News
Bad_Rabbit-2017
- EternalRomance NSA Exploit a Key Player in Bad Rabbit Ransomware Mayhem
- Small Amount of Bad Rabbit Ransomware Victims Detected in the USA
Mirai_Botnet-2017
- Hackers behind Mirai botnet to avoid jail for working with the FBI
- The Mirai Botnet Architects Are Now Fighting Crime With the FBI | WIRED
- Two Hackers Plead Guilty to Creating IoT-based Mirai DDoS Botnet
- Three men plead guilty to creating Mirai botnet [Updated] | Ars Technica
- Botnet Creators Who Took Down the Internet Plead Guilty
- Botnet hackers that caused huge Internet blackout did it for money, revenge
- Mirai botnet: Three admit creating and running attack tool - BBC News
- Hackers behind Mirai botnet & DYN DDoS attacks plead guilty
- The Mirai Botnet Was Part of a College Student Minecraft Scheme | WIRED
- The latest IoT botnet displays evidence of a halfway clever botmaster / Boing Boing
- A new Mirai-style botnet is targeting the financial sector | ZDNet
Triton-2017
- Russia Linked to Triton Industrial Control Malware | WIRED
- Russia launched Triton malware to sabotage Saudi petrochemical plant
- Hackers shut down plant by targeting its safety system
- Hackers Deploy Triton Malware to Shut Down Power Station
- TRITON Malware Targeting Critical Infrastructure Could Cause Physical Damage
- Triton Malware Targets Industrial Safety Systems In the Middle East | WIRED
Satori_Botnet-2018
- A potent botnet is exploiting a critical router bug that may never be fixed | Ars Technica
OMG_Botnet-2018
- OMG! Mirai Variant Creates Proxy Servers - Infosecurity Magazine
Smominru_Botnet-2018
- Mining Smominru botnet used NSA exploit to infect more than 526,000 systemsSecurity Affairs
- Botnet Infects Half a Million Servers to Mine Thousands of Monero - CoinDesk
WannaMine-2018
- WannaMine, the sophisticated crypto miner that spreads via NSA EternalBlue exploitSecurity Affairs
DoubleDoor-2018
- New IoT Botnet DoubleDoor Bypass Firewall to Drop Backdoor
- The global ransomware attack weaponized software updates - The Verge
- World's Biggest Botnet Just Sent 12.5 Million Emails With Scarab Ransomware
- Top 18 Most Dangerous Computer Viruses Of All Time
- Here’s why the epidemic of malicious ads grew so much worse last year | Ars Technica
- New IoT botnet offers DDoSes of once-unimaginable sizes for $20 | Ars Technica
Memcached_DDOS-2018
- Google, PlayStation & NRA suffered DDoS attacks via Memcached servers
- 1.7 Tbps DDoS Attack — Memcached UDP Reflections Set New Record
- Over 15,000 Memcached DDoS Attacks Hit 7,100 Sites in Last 10 Days
Slingshot_APT-2018
- APT Hackers Infect Routers to Covertly Implant Slingshot Spying Malware
VPNFilter-2018
- VPNFilter Router Malware Adds 7 New Network Exploitation Modules
- Destructive and MiTM Capabilities of VPNFilter Malware Revealed
- USA : le FBI publie une méthode pour contrecarrer le maliciel « VPN Filter », qui aurait été utilisé pour pirater plus de 500 000 routeurs
- Le malware VPNFilter, utilisé pour pirater plus de 500 000 routeurs, est plus sophistiqué que ne laissaient penser les premières analyses
- Cisco's Talos Intelligence Group Blog: New VPNFilter malware targets at least 500K networking devices worldwide
- Defending Against the New VPNFilter Botnet
- Stealthy, Destructive Malware Infects Half a Million Routers | WIRED
- A serious security vulnerability has been found in 7-Zip | PC Gamer
Breached_Organizations
Facebook-2018
- Hack Brief: Someone Posted Private Facebook Messages From 81,000 Accounts
- How to Check If Your Facebook Account Got Hacked—And How Badly | WIRED
- 30M Facebook breach; includes users phone numbers and location data
- How Facebook Hackers Compromised 30 Million Accounts | WIRED
- Facebook Hacked, 50 Million Users Affected - Motherboard
- 30 Million Facebook Accounts Were Hacked: Check If You're One of Them
- The Facebook Hack Is an Internet-Wide Failure | WIRED
- Hackers Stole 50 Million Facebook Users' Access Tokens Using Zero-Day Flaw
- Facebook's Massive Security Breach: Everything We Know | WIRED
- Facebook Hacked — 10 Important Updates You Need To Know About
- The Facebook Security Meltdown Exposes Way More Sites Than Facebook | WIRED
- Hackers disrupt UK's Bristol Airport flight info screens after ransomware attack
NewEgg_2018
- Hackers target Newegg with "sophisticated malware"; steal credit card data
British_Airways-2018
- British Airways: Suspect code that hacked fliers 'found' - BBC News
- How Hackers Slipped by British Airways' Data Defenses | WIRED
- British Airways Hacked – 380,000 Payment Cards Compromised
- The British Airways Breach: How Magecart Claimed 380,000 Victims
Apple-2018
- A 16-year-old hacked Apple and stole 90GB of secure files – BGR
Reddit-2018
- Reddit Got Hacked Thanks to a Woefully Insecure Two-Factor Setup | WIRED
- Reddit hacked: Hackers steal complete copy of old database backup
HBGary-2011
- HBGary - Wikipedia
- HBGary Federal Hacked by Anonymous — Krebs on Security
Yahoo-2014
- 22-Year-Old Hacker Pleads Guilty to 2014 Yahoo Hack, Admits Helping Russian Intelligence
Imgur_2014
- Imgur—Popular Image Sharing Site Was Hacked In 2014; Passwords Compromised
- Imgur confirms 1.7 million users hit by data breach - BBC News
Sony_Hack-2014
- Advice from a Real Hacker: Why I'm Skeptical That North Korea Hacked Sony - Sony Hack « Null Byte :: WonderHowTo
- The Sony Hack: Thoughts & Observations from a Real Hacker_Sony_Hack « Null Byte :: WonderHowTo
Uber_2016
- UK regulator has 'huge concerns' over Uber breach - BBC News
- After Getting Hacked, Uber Paid Hackers $100,000 to Keep Data Breach Secret
- www.google.com
- Uber Paid Hackers $100,000 to Cover Up a Breach Impacting 57 Million Customers - Motherboard
- Hackers hit Uber in 2016: data on 57 million riders, drivers stolen | Ars Technica
- Uber Paid 20-Year-Old Florida Hacker $100,000 to Keep Data Breach Secret
- Uber used bug bounty program to launder blackmail payment to hacker | Ars Technica
PayPal-2017
- PayPal Subsidiary Data Breach Hits Up to 1.6 Million Customers
Deloitte-2017
- Security News This Week: The Deloitte Breach Was Worse Than We Thought | WIRED
- Deloitte Hacked — Cyber Attack Exposes Clients' Emails
HBO_Hack-2017
- Iranian charged with Game of Thrones hack - BBC News
- Hackers threaten to leaks new 'Game Of Thrones' episodes 'as soon as possible'
DocuSign-2017
- DocuSign Data Breach Led to Targeted Email Malware Campaign
Dallas_Emergency_System-2017
- Here's How Hacker Activated All Dallas Emergency Sirens On Friday Night
Youbit-2017
- Youbit Bitcoin exchange quits operation after 2 hacks in 8 months
EtherDelta-2017
- EtherDelta’s DNS Hacked, Website Replaced With Hacker’s Duplicate to Steal Funds – The Merkle
- EtherDelta cryptocurrency exchange hacked in fake website scam
Alterix-2017
Equifax_Hack-2017
- Equifax's CEO isn't sure whether they've finally started encrypting their servers yet / Boing Boing
- Equifax data breach may affect up to 143 million people - CNET
- Equifax Data Breach: Steps You should Take to Protect Yourself
- Equifax Deserves the Corporate Death Penalty | WIRED
- How to Protect Yourself from the Equifax Hack!
- Equifax data breach: Credit rating firm replaces key staff - BBC News
- Fake website fools Equifax staff - BBC News
- Equifax blames open-source software for its record-breaking security breach: Report | ZDNet
- The hackers who broke into Equifax exploited a flaw in open-source server software — Quartz
- Equifax says more private data was stolen in 2017 breach than first revealed | ZDNet
- Equifax finds more victims of 2017 breach - BBC News
Fox_IT-2017
- Hackers take control of security firm’s domain, steal secret data | Ars Technica
Nissan-2017
- Nissan Finance Canada Suffers Data Breach — Notifies 1.13 Million Customers
- SEC Discloses Hackers Broke Into Edgar Corporate Filing System Last Year
- Sony PlayStation Social Media Accounts Hacked; Claims PSN Database Breach
- Security firm was front for advanced Chinese hacking operation, Feds say | Ars Technica
- Web Hosting Company Pays $1 Million to Ransomware Hackers to Get Files Back
- App maker's code stolen in malware attack - BBC News
- Phishing Scam: Hackers Steal $150,000 in Ethereum from Experty ICO
- Hospital Pays $55K Ransomware Demand Despite Having Backups
Coincheck-2018
- Someone Stole Almost Half a BILLION Dollars from Japanese Cryptocurrency Exchange
- Hacker erase 1 terabyte of data from spyware developers server
TMobile-2018
- ‘I Lived a Nightmare:’ SIM Hijacking Victims Share Their Stories - Motherboard
- 'Critical' T-Mobile Bug Allowed Hackers To Hijack Users' Accounts - Motherboard
WinterOlympics-2018
- Russia hacked Winter Olympics & framed N.Korea in false-flag attack: US
- Cyber Attack Disrupts Winter Olympics Website During Opening Ceremony
GitHub-2018
- A 1.3Tbs DDoS Hit GitHub, the Largest Yet Recorded - memcached| WIRED
- How GitHub braved the world's largest DDoS attack - memcached
- GitHub survives massive DDoS attack relatively unscathed - memcached
- In Wake of 'Biggest-Ever' DDoS Attack, Experts Say Brace For More | Threatpost | The first stop for security news
- World’s largest DDoS attack thwarted in minutes – Naked Security
- Facebook bug exposed private posts of 14 million users to public
- Ransomware hits Atlanta police dashcam footage - BBC News
- IoT : des pirates s'appuient sur le thermostat connecté d'un aquarium pour pénétrer le réseau d'un casino et extirper 10 Go de data
- Hackers attack Casino’s fish tank thermometer to obtain sensitive data
- Worse than Equifax: Personal records of 340M people leaked online
- A Brief History of Hacking « Null Byte :: WonderHowTo
- The 10 biggest hacks, breaches, and security stories of 2016 | PCWorld
- Some of the World's Most Notorious Hackers Got Hacked « Null Byte :: WonderHowTo
- Stuxnet-like 'Havex' Malware Strikes European SCADA Systems
- Passwords For 540,000 Car Tracking Devices Leaked Online
- CCleaner Backdoor Attack: A State-sponsored Espionage Campaign
- Ransomworm: The birth of a monster - Help Net Security
- Andromeda botnet dismantled in international cyber operation - Help Net Security
- Young Hacker, Who Took Over Jail Network to Get Friend Released Early, Faces Prison
- MailSploit — Email Spoofing Flaw Affects Over 30 Popular Email Clients
- New Mirai Botnet Variant Found Targeting ZyXEL Devices In Argentina
- U.S. Charges Three Chinese Hackers for Hacking Siemens, Trimble & Moody
- Oxford and Cambridge club members face hard disk theft - BBC News
- Ransomware Attack Involving Scarab Malware Sends Over 12M Emails in 6 Hours
- How Shipping Giant Maersk Dealt With a Malware Meltdown, And Other Security News This Week | WIRED
- Man hacks prison computers & alters records for pal's early release
- The Biggest Cybersecurity Disasters of 2017 So Far | WIRED
- Here's How Hacker Activated All Dallas Emergency Sirens On Friday Night
- Webroot deletes Windows files and causes serious problems for users | InfoWorld
- Ransom Fail: Hackers Leak Thousands of Naked Photos of Plastic Surgery Patients
- A Trove of 1.4 Billion Clear Text Credentials File Found on Dark Web
- Feds Seize Over 20,500 Domain Names For Selling Counterfeit Products
- Newly Uncovered 'MoneyTaker' Hacker Group Stole Millions from U.S. & Russian Banks
- Hackers steal 19M California voter records after holding database for ransom
- Researchers Find Trove of 1.4 Billion Breached Credentials - Infosecurity Magazine
- Lenovo removes backdoor present in networking switches since 2004
- Police give out infected USBs as prizes in cybersecurity quiz – Naked Security
- Flight Sim Lab installed Chrome passwords stealer in piracy check tool
- To hack Australia and learn its secrets, buy second-hand furniture • The Register
- Developer gets prison after admitting backdoor was made for malice | Ars Technica
- A Hacker Has Wiped a Spyware Company’s Servers—Again - Motherboard
- Uncovered: Cyber Espionage Using Fake Apps with Android Malware - CPO Magazine
- PSA: Improperly Secured Linux Servers Targeted with Chaos Backdoor
- À cause d'une ligne de code, des milliers de personnes se sont retrouvées dans des prisons en Turquie ! Le cauchemar de la nation est numérique
- Hacker Who Never Hacked Anyone Gets 33-Month Prison Sentence
- Sauron's Spies Are Everywhere — Even on Computers | HowStuffWorks
- An Exploit Left Millions of Steam Users Vulnerable for the Past 10 Years - Motherboard
- Man whose DDoS attacks took down entire country's Internet jailed - Mirai botnet
- Scraping the Web with Nutch for Elasticsearch - Local search engine
- Apache Solr - Ref Guide
Hacking_Groups
Non-Governmental_Groups
Shadow_Brokers
- The Shadow Brokers - Wikipedia
- Shadow Brokers Gets Results! Congress Finally Moves to Oversee Vulnerabilities Equities Process – emptywheel
Dark_Overlord
- Suspected member of The Dark Overlord hacking group arrested
Equation_Group
- Equation Group - Wikipedia
SowBug
- Newly Uncovered 'SowBug' Cyber-Espionage Group Stealing Diplomatic Secrets Since 2015
Group123
- An Adobe Flash 0day is being actively exploited in the wild | Ars Technica
LulzSec
- LulzSec - Wikipedia
TeaMp0isoN
- TeaMp0isoN - Wikipedia
- List of hacker groups - Wikipedia
- Poor coding limits IS hackers' cyber-capabilities, says researcher - BBC News
- Dragonfly 2.0: Hacking Group Infiltrated European and US Power Facilities
- Romanian Police Arrest 5 People for Spreading CTB Locker and Cerber Ransomware
Fin7
- Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches | WIRED
Individual_Hackers
- List of hackers - Wikipedia
- List of computer criminals - Wikipedia
- AT&T Hacker ‘Weev’ Sentenced to 3.5 Years in Prison | WIRED
- Johnny Long - Wikipedia
- Max Butler - Wikipedia
- Record 13-Year Sentence for Hacker Max Vision | WIRED
- Hacking Groups - MITRE ATT&CK™
- Fin7: The Billion-Dollar Hacking Group Behind a String of Big Breaches | WIRED
- Three Arrests Made in Largest Hack in Lebanon's History
Cybersecurity_Awareness_And_Sensibilisation
- How to give your parents the security talk this Thanksgiving - CNET
- Building an Information Security Awareness Program in 5 Easy Steps
- Smart behaviors that can improve your cybersecurity
- The Motherboard Guide to Not Getting Hacked - Motherboard
- How Hacking Works - Motherboard
- 5 Simple Tricks To Stop Hackers
- After Yahoo and Equifax hacks, cybersecurity goes mainstream - CNET
- How hackers can save lives? – tbmnull – Medium
- The Cyber Security Hub™ on LinkedIn: "10 Steps To Cyber Security - Infographic via UK's National Cyber Security Centre (NCSC)"
Company-Wise
- What breaks our systems: A taxonomy of black swans | Opensource.com
- Managing Insider Threats with Internal Monitoring
- NIST, CIS/SANS 20, ISO 27001: What's the difference?
- No One Can Get Cybersecurity Disclosure Just Right | WIRED
- Information Security Controls: Frequently Asked Questions (FAQ)
- Penetration Testing vs. Red Teaming: PCI Edition | Tim MalcomVetter | LinkedIn
- ISO 27001 Lead Implementer Online Course | Advisera eTraining
- R.I.P. root9B? We Hardly Knew Ya! — Krebs on Security
- Top 10 companies hiring cybersecurity professionals - TechRepublic
- 10 Top Cybersecurity Companies | Investing News Network
- Linux creator Linus Torvalds: This is what drives me nuts about IT security | ZDNet
- 5 Questions to ask from client before penetration testing engagement
- How To Remotely Access Another Computer From Your Computer
- Security pros at hacker conference: Be more boring | TheHill
- Protect and defend
- Security Think Tank: 10 control areas to mitigate against malware attacks
- How your company needs to train workers in cybersecurity | Computerworld
- Don't Forget Basic Security Measures, Experts Say
- Virtual and Augmented Reality: Transforming The Way We Look At The Internet and Data Security
- Ransomware: A cheat sheet for professionals - TechRepublic
- 10 conseils pour la sécurité de votre système d’information | CNIL
- A new approach to security instrumentation | Opensource.com
- 6 Tips to Protect Your Online Business from Cyber Attacks
- Corporate Cybersecurity Lone Rangers Do Not Exist | Wayne Fischer | Pulse | LinkedIn
- Jigsaw (company) - technology incubator created by Google - Investor in Arbor Networks DigitalAttackMap - Wikipedia
General_Resources
- Google Project Zero
Exploit-Malwares-Security_Tools_Resources
- Exploits Database by Offensive Security
- KitPloit - PenTest Tools for your Security Arsenal ☣
- Gotowebsecurity For Internet Security Tips | Mobile Phone Security Tips
- Ethical Hacking Archives - websecurity
- 0x09AL (Rio) · GitHub
- Fantastic Malware and Where to Find Them – Megabeets
- DanMcInerney (Dan McInerney) · GitHub
- Ice3man543 (Nizamul Rana) · GitHub
- Research
- urbanadventurer (Andrew Horton) · GitHub
- Smaash · GitHub
- Kellgon - The Hacker Tutorial - Tools
- t0kx · GitHub
- christophetd (Christophe Tafani-Dereeper) · GitHub
- m0rtem ( MortySec) · GitHub
- HatBashBR · GitHub
- ToolWar | Information Security (InfoSec) Tools
- GitHub - Cryptogenic/Exploit-Writeups: A collection where my current and future writeups for exploits/CTF will go
- Malware Sources - PenTestIT
- JonathanSalwan (Jonathan Salwan) · GitHub
- Appendix A: Testing Tools - OWASP
Articles_Ref_List
- SEED Project
- GitHub - enaqx/awesome-pentest: A collection of awesome penetration testing resources, tools and other shiny things
- professional education - Books about Penetration Testing - Information Security Stack Exchange
- 9 Books to follow if you want to become a ethical hacker - Coding Security
- GitHub - infoslack/awesome-web-hacking: A list of web application security
- Favorite conference talks · AnarchoTechNYC/meta Wiki
- 100+ Best Hacking Books Free Download In PDF 2017
- The Top Cyber Security Blogs and Websites of 2018
- Light Blue Touchpaper | Security Research, Computer Laboratory, University of Cambridge
- 9 Popular Training Courses to Learn Ethical Hacking Online
- Introduction to Computer and Network Security
- Computer Security
- Welcome to Hellbound Hackers - Hacking Forum - Tutorials, articles - Challenges
- OWASP Testing Guide Appendix B: Suggested Reading - OWASP
- MalwareTech - Life of a Malware Analyst
- Projects – Security – opensource.google.com
- Deceptive Security – An offensive security blog
- HOME - Black Hills Information Security
- LiveOverflow - LiveOverflow
- Google Online Security Blog
- Cybrary - Online Cyber Security Training, Free, Forever
- awesome-infosec/readme.md at master · onlurking/awesome-infosec - hacking labs, pen-testable targets - secure coding - trusted computing - cellular network security - smart cards - BIOS, SMM, UEFI - Cryptography - competitions, CTFs, hacking challenges - honeypots - definitive list of awsome hacking/security tools - UNIX/Linux Capabilities, least privilege principle - Android rooting hacking lab
- http://www.hackers-arise.com/
- OWASP
- Exploit Database - Archived Security Papers
- 0x00sec - The Home of the Hacker
- Avatao
- Learn Ethical Hacking and Penetration Testing Online
- Kellgon - The Hacker Tutorial
- Hacking Archives - Develope IT
- Pentest Armoury | Information Security Blog
- Kellgon - The Hacker Tutorial
- Pirater comme un nul(l) | L'informatique c'est pas si compliqué
- Home · AnarchoTechNYC/meta Wiki · GitHub
- Uneedsec – Ethical Hacking & Pentesting Blog
- ls /blog
- SECURITY GEEK
- DinoSec
- Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs
- Welcome to SecurityTube.net
- Hacking Articles - Raj Chandel's Blog
- sploitspren - absolomb's security blog
- VulnerabilityAssessment.co.uk
- The Many Hats Club: An InfoSec Group For All Skill Levels
- Hack The World · Juan Carlos Jimenez
- CyberPunk: The Best Open Source CyberSecurity Tools
- hack.lu 2018
- Index of /
- pofHQ | Pau Oliva Fora personal blog
- Artificial truth
- Hex Blog – State-of-the-art code analysis
- Home | Ring 0x00
- DotNetRussell – All things tech
- Hacker Curriculum
- LWN Security Resources [LWN.net]
- Bits, Please! - Beniamini cyber security blog
- Christophe Tafani-Dereeper - Personal tech and security blog about things I like, use, dislike and misuse.
- Digital Operatives Blog
- Jim Shaver | IT Security Professional
- UT Austin Information Security Office – securus // vigilare // insanus
- Development & Security | By Jurriaan Bremer @skier_t
- Zer0Mem0ry (Zer0Mem0ry) · GitHub
- You’ve Been Haacked | You’ve been Haacked and you like it is a blog about Technology, Software, Management, and Open Source. It’s full of good stuff.
- PenTestIT - Your source for all things Information Security!
- HighOn.Coffee • Security Research • Penetration Testing Blog
- Jirairya security blog
- Computer Security Student | Cyber Security Lessons, Tutorials, and Training
- Compass Security Blog – Offensive Defense
- Phrack Magazine
- Servers for Hackers
- defenceindepth
- insecure.ws - Resources
- Rebootuser – Just another bunch of 1's and 0's
- Security Archives - RootUsers
- CS342 Computer Security, Fall 2008 | Home
- Schneier on Security
- shell-storm | Home - static and dynamic program analysis, OSdev, reverse engineering, bugs exploitation, de-obfuscation - ROP Return Oritented Programming - Shellcode for ARM
- Blog for and by my students, current and future...
- Security Research * Penetration Testing Blog
- Idea of the day
- Checkmate - Pentest | Audits | Compliance | Forensics | INR
- Information Security News|Data Breach Incidents|Hacking News
- Chengyu Song - Automated Vulnerability Discovery/Elimination - Attacks spectre - malware analysis
- Capt. Meelo - Hacking/Security Writeups
- phackt.com:~#
- Hack Forums - Underground forum - Hosted Mirai Botnet Author Anna-Senpai profile
- Blog - Spain Cybersecurity Organism| INCIBE-CERT
- MITRE ATT&CK™ Blog – Medium
- Blog Archive | WhiteHat Security
- Hacker101 - Learn How To Hack - Free Online Course | HackerOne
- MalwareMustDie! · MMD Malware Research Blog
- Bugcrowd Forum - community for hackers & security researchers
- InfoSec · AnarchoTechNYC/meta Wiki · GitHub
- Secure Belief - security resources - hacking challenges solutions
- Quarkslab's blog - resource - reverse engineering, cryptography, exploitation, fuzzing, challenges
- Megabeets — Behind the lab doors - hacking, malware, reverse engineering resources, writeups
- Penetration Testing Lab | Offensive Techniques & Methodologies
MrRobot_Hacks_Analyses
MrRobot_Hacks-NullByte_Tutorials
- Mr. Robot Hacks « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How to Send a Spoofed SMS Text Message « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How to Hide Data in Audio Files « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How to Send Ultra-Secure Emails « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How Elliot & Fsociety Destroyed Evil Corp's Data « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How to Spy on Anyone's Smartphone Activity « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How Elliot & Fsociety Made Their Hack of Evil Corp Untraceable « Null Byte :: WonderHowTo
- The Hacks of Mr. Robot: How to Build a Hacking Raspberry Pi « Null Byte :: WonderHowTo
Season1
e1
- Mr. Robot Episode 1 Analysis
e2
e3
e4
e5
e8
e6
e7
e9
e10_final
- hdshredder mr robot - Google Search
- Mr. Robot: every title and episode, explained—Hopes&Fears
e2
e3
- A Peek Inside Mr. Robot’s Toolbox | WIRED
- The Mr. Robot Hack Report: Skimming links for fun and profit - The Verge
- Why Facebook Is Evil, According To Mindblowing New Series Mr. Robot
- exit relays - Is the “Ron's Coffee” Tor-related hack technically possible in episode 1x01 of Mr. Robot? - Tor Stack Exchange
- ‘Mr. Robot’ Rewind: Hunting for flaws in an intense Episode 6 – GeekWire
- ‘Mr. Robot’ Rewind: Mostly accurate tech in a mind-blowing Episode 8 – GeekWire
- DIY “Low Tech” Hacks of Mr. Robot - MR ROBOT HACKS
- What we can learn from the hacks on season one of Mr. Robot
- social engineering toolkit mr robot - Google Search
- hdshredder mr robot - Google Search
- osticket mr robot - Google Search
Season2
- home mobile tower - Google Search
- 'Mr. Robot' episode analysis: 'Unmask Pt. 1' - Business Insider
- ‘Mr. Robot’ Rewind: Checking for vulnerabilities in Episode 4 – GeekWire
- iPhone Cheats / Hack for Postmates - Food Delivery, Faster 2017
- 14.04 - What init 1 command exactly does? - Ask Ubuntu
- mr robot putty config - Google Search
- apn - Google Search
- bitchx ssh irc - Google Search
- BitchX IRC Client
- ‘Mr. Robot’ Rewind: Owning the FBI in Episode 5 – GeekWire
- ‘Mr. Robot’ Rewind: Backdooring a monitor for FBI surveillance in Episode Two – GeekWire
- Hacking IRL: What Mr. Robot Teaches Us About Cybersecurity
- The Mr. Robot Hack Report: Hacking Android phones with a rogue femtocell - The Verge
- ‘Mr. Robot’ Rewind: Booby-Trapping Femtocells from the Forest in Episode 3 – GeekWire
- Yes, you can hack cell phones like on Mr. Robot—just not the way they did | Ars Technica
- What’s a femtocell? Hacking Mr. Robot, Week 4.
- Mr Robot TV show with TOR installation instructions. – Securitron Linux blog.
- The Mr. Robot Hack Report: Lighting up the dark web - The Verge
- fuxsocy mr robot - Google Search
- Shellshock (software bug) - Wikipedia
- How Mr. Robot’s Most Complicated Hack Yet Came Together
- Mr Robot season 2 episode 5 review: Logic Bomb | Den of Geek
- The Mr. Robot Hack Report: Stagefright and real-life ransomware - The Verge
- Hacking ‘Mr. Robot’: 5 technology security lessons from the hit TV show – GeekWire
- home mobile tower - Google Search
- openwrt mr robot - Google Search
- The Mr. Robot Hack Report: Cantennas and dirty USB drives - The Verge
- Mr. Robot eps2.4m4ster-s1ave.aes – the security review – Naked Security
- Femtocell - Wikipedia
- 15 Second Password Hack, Mr Robot Style | Technolust since 2005
- Mr. Robot review: eps2.4_m4ster-s1ave.aes
- ‘Mr. Robot’ Rewind: An unreliable narrator, but mostly reliable tech in Episode 7 – GeekWire
- Latest Mr. Robot episode pokes fun at Android users, security issues
- Wickr, Mr Robot and the CryptoWars 2.0, page 1
- What phone messenger software are the characters using in Mr Robot s02e06? - Quora
- 'Mr. Robot' uses a Pwn Phone, the work of one Boston-based startup
- irc.colo-solutions.net/ – Mr. Robot Args
- ‘Mr. Robot’ Rewind: An exciting Episode 10 features social engineering and a Pringles ‘cantenna’ – GeekWire
- How To Make a Wi-Fi Antenna Out Of a Pringles Can
- Our Favorite Hacker Moments From Mr. Robot Season 2 | WIRED
- 1 answer: How does the makeshift high-powered Wi-Fi antenna from Mr. Robot work? - Quora
- ‘Mr. Robot’ Recap, Season 2 Episode 10 — Darlene Shot? | TVLine
- Mr. Robot review: eps2.8_h1dden-pr0cess.axx
- ROT13 - Wikipedia
- Uninterruptible power supply - Wikipedia
- ASCII 2 Hex
- ‘Mr. Robot’ Rewind: Pwning battery backups in an explosive season finale – GeekWire
- Mr. Robot season 02 recap: 10 security lessons learned
- A collection of "Mr. Robot" Season 2 Easter Egg Sites. #mrrobot #hackingrobot #robotegg
- unixlegion.com: Mr. Robot eps2.3logic-b0mb.hc – the security review
- ‘Mr. Robot’ Rewind: Analyzing Fsociety’s hack-filled cyber heist in episode 6 – GeekWire
- 6 Ways Mr. Robot Is Putting Linux in the Public Eye
- Mr. Robot – The Asocial
- femtocell hacking - Google Search
- Tanium - Behind the hack: Mr. Robot season 2 finale
- D-Link: A Firmware Security Analysis – Part 1 | ReFirm Labs
Season3
- Mr Robot Season 3 Ep.2 - Sup Forums
- https://www.google.com/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&ved=0ahUKEwilxsXtw5_XAhXE7iYKHZxRBvgQFggoMAA&url=https%3A%2F%2Fnakedsecurity.sophos.com%2F2017%2F10%2F19%2Fmr-robot-eps3-1undo-gz-the-security-review%2F&usg=AOvVaw1OCDwqsGqznZFGblRdsweu
- A Roundtable of Hackers Dissects 'Mr. Robot' Season 3 Episode 2: 'Undo' - Motherboard
- Darlene And Elliot Try To Reconnect As ‘Mr. Robot’ Explores ‘Metadata’
- The Hacks of Mr. Robot: How to Hack Bluetooth « Null Byte :: WonderHowTo
- Mr. Robot Season 3 Episode 3 Review: Legacy
- A Roundtable of Hackers Dissects 'Mr. Robot' Season 3 Episode 5: 'Runtime Error' - Motherboard
- Very-small-aperture terminal - Wikipedia
- Mr. Robot eps3.2_legacy.so – the security review – Naked Security
- ‘Mr. Robot’ Recap: Season 3, Episode 3, ‘Legacy’ — Tyrell Flashback | TVLine
- Real World FSociety Malware Is Giving Mr. Robot a Bad Name
- The Mr. Robot Hack Report: All about the Feds - The Verge
- There’s Now a Mr. Robot-Inspired ‘fsociety’ Ransomware in The Wild - Motherboard
- AlbinoGeek/Hardware-Mod: A mod for the game "Software Inc." which adds Computer Hardware.
- Mr. Robot Disassembled: eps3.2_legacy.so – Ryan Kazanciyan – Medium
- dns - How does Malware use Unregistered Domains - Information Security Stack Exchange
- Command and control - C2 - Wikipedia
- ‘Mr. Robot’ Rewind: Hacking a DEF CON CTF in the lights out season 3 premiere – GeekWire
- Mr. Robot Disassembled: eps3.0_power-saver-mode.h – Ryan Kazanciyan – Medium
- The Mr. Robot Hack Report: Minesweeper and a fake stolen car - The Verge
- Mr. Robot Disassembled: eps3.1_undo.gz – Ryan Kazanciyan – Medium
- Mr. Robot Hacks, Season 3: How Elliot Covered his Tracks | hackers-arise
- Mr. Robot eps3.3_metadata.par2 – the security review – Naked Security
- A Roundtable of Hackers Dissects the Season 3 Premiere of 'Mr. Robot' - Motherboard
- Mr Robot season 3 episode Eps3.0_Power-Saver-Mode.H – the security review – Naked Security
- Mr. Robot's Netflix 'n' Hack · AnarchoTechNYC/meta Wiki
- How the Real Hackers Behind Mr. Robot Get It So Right | WIRED
- Mr. Robot Is the Best Hacking Show Yet—But It’s Not Perfect | WIRED
- Hacking Techniques & Kali Linux - Mr. Robot Season 2 — The Hack Today
- What has Mr. Robot done for the security industry? | CSO Online
- mr robot shutting down the backdoor at DuckDuckGo
- Zero Days | Deadline
- HBO Developing ‘Stuxnet’ Drama Based On Alex Gibney’s ‘Zero Days’ | Deadline
Computers_Systems_Design
CPUs
Architectures
Archs-Assemblies-Low_Level_Programming
ABI-Calling_Conventions
- Application binary interface - ABI - contains calling conventions - Embedded ABI, PowerPC, ARM, MIPS EABI
- Calling convention - x86 32 bit vs ARM 32 bit vs ARM 64 bit vs PowerPC vs MIPS vs SPARC vs IBM System/360 vs SuperH vs 68k vs IBM 1130
- api - What is an application binary interface (ABI)? ELF, PE, compatibility layer- Stack Overflow
- System V Interface Definition - SVID - Wikipedia
- System V ABI specifications papers - Xinuos Inc. | Developers | SCO Developer Specs
- System V ABI - Interface Definition - calling conventions, function parameters passing - OSDev Wiki
- What are the purposes of the ARM ABI and EABI? - Stack Overflow
x86_arch
Refs
- Intel® 64 and IA-32 Architectures Software Developer’s Manual
- Intel® 64 and IA-32 Architectures Software Developer Manuals | Intel® Software
- 'x86' tag wiki - definitive documentation resources list - SSE, SIMD
x86_32
x86_Refs
Corresponding_ABI-Calling_Conventions
- SysV-ABI_1997 - First Draft
- SysV-ABI_1997 - Updates History
- System V ABI i386 - Architecture Processor Supplement - Fourth Edition
- DEFINITIVE - HJLebbink/asm-dude Wiki · x86 -
- x86 and amd64 instruction reference
- X86 Opcode and Instruction Reference
- Intel 80x86 Assembly Language OpCodes
- Intel x86 JUMP quick reference - JO/JNO, JS/JNS, JE/JZ, JNE/JNZ, JP/JPE, JNP/JPO, JCXZ/JNCXZ, JB/JNAE/JC, JNB/JAE/JNC, JBE/JNA, JA/JNBE, JL/JNGE, JGE/JNL, JLE/JNG, JG/JNLE - definitive equivalence between x86 Jcc Jump instructions with respect to status flags CF,OF,SF,ZF etc
- x86 Assembly Language Reference Manual
- x86 calling conventions - cdecl, syscall - Wikipedia
- Guide to x86 Assembly - <reg32>, <mem>, <con32> - Intel Syntax
- x86 Assembly - Wikibooks, open books for an open world
- Guide to x86 Assembly - AT&T Syntax
- sandpile.org -- The world's leading source for technical x86 processor information.
- Mirror of: Into the Void: x86 Instruction Set Reference
- x86 instruction listings - Wikipedia
- How does a 32-bit machine compute a double precision number - Stack Overflow
- IA-32 = x86 = i386 - Intel Architecture 32 bits - 32-bit version of the x86 instruction set architecture - Wikipedia
- assembly - Why are first four x86 GPRs named in such unintuitive order? - Retrocomputing Stack Exchange
- x86 - What does multicore assembly language look like? - Stack Overflow
- What is the difference between i386 and x86 architectures? - Quora
- assembly - What does the `TEST` instruction do - definitive breakdown - Reverse Engineering Stack Exchange
- assembly - test vs and vs or vs cmp in x86 - Test whether a register is zero with CMP reg,0 vs OR reg,reg? EFLAGS, ZF, CF - performance related - Stack Overflow
- assembly - test eax against eax? test vs and, cmp vs sub, JZ = JE, JNZ = JNE - EFLAGS ZF, CF, OF, PF, SF - in x86 assembly- definitive answer - Stack Overflow
- Understanding how function call works - x86 32 bits - stack management
- Where the top of the stack is on x86 - Eli Bendersky's website
x86_64
x86_64_Refs
- Introduction to x64 Assembly | Intel® Software
Corresponding_ABI-Calling_Conventions
- x86_64-elf-abi-0.99.pdf
- 2013 Draft - System V Application Binary Interface ABI - AMD64 Architecture Processor Supplement (With LP64 and ILP32 Programming Models)
- assembly - Difference in ABI between x86_64 Linux functions and syscalls - Stack Overflow
- Overview of x64 Calling Conventions
- windows - Why does Windows64 use a different calling convention from all other OSes on x86-64? - Stack Overflow
- 2014 Draft - System V Application Binary Interface ABI - AMD64 Architecture Processor Supplement
- X86 psABI · hjl-tools/x86-psABI - unwind
- Let's Write Some x86-64 - Nick Desaulniers
- x86-64 = x64 = amd64 = Intel 64 - 64 bits extension version of x86 32 bits ISA -Different from IA-64 Itanium architecture
- Why can I access lower dword/word/byte in a register but not higher? - Stack Overflow
- x64 Software Conventions
- intel 64 vs amd64 at DuckDuckGo
- 64bit - What is the difference between x64 and IA-64? - Stack Overflow
- Stack frame layout on x86-64 - Eli Bendersky's website
- c - What is the purpose of the RBP register in x86_64 assembler? -fomit-pointer - System V ABI - frame/base pointer - Stack Overflow
- DEFINITIVE - 64-bit - The definition of a 64-bit system and overview of its evolution Architecture of 64-bit systems Data model, types' sizes, alignment
Memory_Management
- assembly - Difference between memory location and memory segment - Stack Overflow
- c - Does a stack allocate more space if needed or does it overflow? Storing data beyond ESP on stack - Signal Handler use of stack- stack size change with ld - Stack Overflow
- c - Explain esp-ebp in this program - Allocating more space than needed on stack - -mpreferred-stack-boundary in GCC - stack smashing detection on buffer overflow, fno-stack-protector - cdecl calling convention - Stack Overflow
- c++ - Why more space on the stack frame is reserved than is needed in x86 - 16-bytes alignment - LEA instruction - LP64 data model - Stack Overflow
- gcc - Stack allocation, why the extra space? 16-bytes alignment, extra space allocation on stack - x86 - gcc - Stack Overflow
Syntaxes
- assembly - NASM (Intel) versus AT&T Syntax: what are the advantages? - Stack Overflow
- c - Limitations of Intel Assembly Syntax Compared to AT&T - Stack Overflow
- docs/x86.md at master · corkami/docs · GitHub
- NOP - Wikipedia
- FLAGS register - eflags - Wikipedia
- Status register - Wikipedia
- x86 memory segmentation - segment, offset, address - real/protected mode - segment registers - kernel code segment
- Memory Segmentation in 8086 Microprocessor - GeeksforGeeks
- c - Function called in a file without a prototype produce different results on ARM and x86-64 - Stack Overflow
- assembly - What's the purpose of the nop opcode? - Stack Overflow
- Why do we need the "nop" I.e. No operation instruction in microprocessor 8085? - Electrical Engineering Stack Exchange
- c - What is __i686.get_pc_thunk.bx? Why do we need this call? - Stack Overflow
- x86 Assembly MOV instruction - Register to Register and Memory to Memory - Stack Overflow
- assembly - Why can't MOV have both operands as memory locations? - Stack Overflow
- mov instructions with byte destination for immediate to memory - Assembly - Stack Overflow
- performance - Does a mov instruction that involve memory access get done slower than mov between registers - Stack Overflow
- x86 - Memory-to-memory copy - Stack Overflow
- assembly - Memory to memory MOV - Correct Syntax - Stack Overflow
- Is the "MOV" instruction in Assembly to allocate memory? - Stack Overflow
- gcc - TEST Instruction and AND Instruction x86 - Stack Overflow
- TEST (x86 instruction) - Wikipedia
- gdb - What is the difference between leave and ret - Stack Overflow
- assembly - "enter" vs "push ebp; mov ebp, esp; sub esp, imm" and "leave" vs "mov esp, ebp; pop ebp" - Stack Overflow
- c - Cost of push vs. mov (stack vs. near memory), and the overhead of function calls - Stack Overflow
- assembly - Push/Pop vs Mov in MASM - Stack Overflow
- c - Assembly x86 - "leave" Instruction vs enter - Stack Overflow
- assembly - Frame Pointer Explanation - Software Engineering Stack Exchange
- performance - What is the purpose of the EBP frame pointer register? IA-32/x86 - frame/base pointer obsolescence - stack unwinding - Stack Overflow
- Getting the call stack without a frame pointer
- c++ - What is exactly the base pointer and stack pointer? To what do they point? - Stack Overflow
- Assembly Language: Is there any difference between frame pointer and base pointer? - Quora
- assembly - What is the difference between MOV and LEA? - Stack Overflow
- assembly - What do the brackets mean in x86 asm? - Stack Overflow
- assembly - LEA or ADD instruction? - Stack Overflow
- x86 - Assembly language - can LEA instruction be used to load value - Stack Overflow
- x86 - Why can assembly instructions contain multiplications in the "lea" instruction? - Stack Overflow
- assembly - Is a shift instruction faster than an IMUL instruction? - Stack Overflow
- c - Using LEA on values that aren't addresses / pointers? - Stack Overflow
- assembly - What's the purpose of the LEA instruction? - lea vs mov x86 Stack Overflow
- assembly - LEA or ADD instruction? - Stack Overflow
- assembly - How is the x86 JAE instruction related to the carry flag? jae = jnc = jnb - Relationship with cmp and sub - Stack Overflow
- x86 16 - Why does CMP (compare) sometimes sets a Carry Flag in 8086 assembly? - Stack Overflow
- math - Overflow and Carry flags on Z80 - Stack Overflow
- Jumps, flags, and the CMP instruction Article - definitive thorough analysis of SF, ZF, CF and OF flags as they get changed by CMP instruction - JMP instructions family - signed vs unsigned binary arithmetics
- memory management - Is the EBP register (base frame pointer) only for Debugging in x86? -fomit-pointer - frame/base pointer obsolescence - stack unwinding - Stack Overflow
- x86 - Assembly - JO/JNO, JS/JNS, JE/JZ, JNE/JNZ, JP/JPE, JNP/JPO, JCXZ/JNCXZ, JB/JNAE/JC, JNB/JAE/JNC, JBE/JNA, JA/JNBE, JL/JNGE, JGE/JNL, JLE/JNG, JG/JNLE - definitive equivalence between x86 Jcc Jump family instructions with respect to status flags CF,OF,SF,ZF etc - after CMP - Stack Overflow
- Adjust flag - AF - Auxiliary Flag/Carry
- What is the difference between LEA and MOV offset instruction in assembly-level programming? load effective address x86
- cpu - x86/IA-32 registers: MBR/MDR and instruction registers - Current Instruction Register (CIR) or Memory Buffer Registers (MBR)/Memory Data Registers (MDR) - definitive Peter Cordes answer - instruction cycle, decoding
- IA-64 - Itanium - Not to be confused with x86-64 - Wikipedia
- x86 - family of instruction set architectures initially developed by Intel - 16/32/64/128/256/512 bits registers - SSE/SIMD - protected mode - x86-64
- x86 = Intel 80x86, IA-32
MicroBlaze
- MicroBlaze - similar to the RISC-based DLX architecture described in a popular computer architecture book by Patterson and Hennessy - soft microprocessor core designed for Xilinx field-programmable gate arrays (FPGA). As a soft-core processor, MicroBlaze is implemented entirely in the general-purpose memory and logic fabric of Xilinx FPGAs
ARM
- ELF for the ARM Architecture - IHI0044F_aaelf.pdf
- Local Variables on the Stack - ARM assembly, prologue/epilogue
- ARM architecture - Wikipedia
- List of ARM microarchitectures - Wikipedia
- Is ARM a microprocessor or microcontroller? cpu vs mcu, rapsberry pi, flash memory - definitive breakdown- raspberry pi, ESP8266, set-top-box, modem/router
SPARC
- SPARC - reduced instruction set computing (RISC) instruction set architecture (ISA)
PowerPC
- PowerPC - soft microprocessor (also called softcore microprocessor or a soft processor) is a microprocessor core that can be wholly implemented using logic synthesis. It can be implemented via different semiconductor devices containing programmable logic (e.g., ASIC, FPGA, CPLD), including both high-end and commodity variations - largely based on IBM's earlier POWER instruction set architecture, and retains a high level of compatibility with it; the architectures have remained close enough that the same programs and operating systems will run on both if some care is taken in preparation; newer chips in the POWER series use the Power ISA
- IBM POWER instruction set architecture - reduced instruction set computer (RISC) instruction set architecture (ISA) developed by IBM. The name is an acronym for Performance Optimization With Enhanced RISC
MIPS
- MIPS architecture - Wikipedia
Itanium
- IA-64 Itanium
- Cray Y-MP - Wikipedia
CPUs_Word_Size
- Processor, OS : 32bit, 64 bit - Stack Overflow
- how much memory can be accessed by a 32 bit machine? - Stack Overflow
- What is the max. capacity of RAM in 32-bit machine? Why it is not 16GB? - Super User
- If I have a 32-bit CPU, how can I have more than 2^32 bits (0.5Gb) of RAM? - Quora
- Answer - Quora
- why can't 32 bits cpu handle 64 bits addresses by splitting them across register - Google Search
- 32-bit fixed instruction length in 64-bit memory space - Stack Overflow
- 32-bit - Wikipedia
- 32-bit vs. 64-bit systems - Super User
- Why don't we have 33-bit CPUs? - Super User
- 64-bit computing - 32-bit vs 64-bit - LP64/LLP64 and ILP64/SILP64 Data Model - two's complement - (un)intptr_t - Address spaceWikipedia
- cpu - How much memory can a 64bit machine address at a time? - Super User
- Why can a 32-bit Go program handle 64-bit numbers? - Quora
- memory - Why does a 32-bit OS support 4 GB of RAM? - Stack Overflow
- 32-Bit vs. 64-Bit | Digital Trends
- Why can't 32-bit Windows access 4GB of RAM? | PCWorld
- Clearing up the 32/64-bit memory limit confusion | ZDNet
- memory - If 32-bit machines can only handle numbers up to 2^32, why can I write 1000000000000 (trillion) without my machine crashing? - Super User
- 64 bit - How many memory addresses can we get with a 32-bit processor and 1gb ram? - Super User
- why does a 64bit cpu handle only 2 power48 addresses at DuckDuckGo
- x86 64 - Why do 64 bit systems have only a 48 bit address space? - Stack Overflow
- c++ - Long long int on 32 bit machines - Stack Overflow
- cpu - How many bytes a 64 bit processor processes? - Super User
- computer architecture - Why does a processor have 32 registers? - Computer Science Stack Exchange
- memory - Addressing on 32bit and 64bit architectures - Stack Overflow
- Why do x86-64 systems have only a 48 bit virtual address space? - byte-addressable -
- assembly - Why in 64bit the virtual address are 4 bits short (48bit long) compared with the physical address (52 bit long)? - PAE - Stack Overflow
- In the CPU, does the 64-bit data bus also mean a 64-bit address bus? - Quora
- computer architecture - What all can be said when you say that the CPU is 32 bit? - n bits CPU defiinition - Computer Science Stack Exchange
- c - x86_64 ASM - maximum bytes for an instruction? - Stack Overflow
- computer architecture - How can a CPU access more memory locations than 2^wordsize? - Computer Science Stack Exchange
- memory - Is it the address bus size or the data bus size that determines "8-bit , 16-bit ,32-bit ,64-bit " systems? - Super User
- Why should the data bus width be matched to the word size of the CPU? - Quora
- terminology - Is word size, the size of a memory location? the size of the data bus? or the cpu register size? definitive explanation
- computer architecture - Difference between data bus, address bus and CPU bit size - Computer Science Stack Exchange
- computer architecture - word size and data bus - Stack Overflow
- Why can't OS use entire 64-bits for addressing? Why only the 48-bits? - Stack Overflow
- 64bit - Using the extra 16 bits in 64-bit pointers - definitive in-depth insights about 48 bit limitation in x86-64/amd64 CPUs - sign extension risks in C++ - Stack Overflow
- How are CPU architecture and word size related? - Computer Science Stack Exchange
- If a CPU has a 16 bit address bus and 8 bit words, how much memory can it address? definitive word definition
Machine_Code
- Is it possible to program in binary? - Stack Overflow
- Programming directly in binary - machine code - Software Development | DaniWeb
- Is it possible for someone to code directly in binary? - Quora
- Fat binary - Multi-architecture binary - Wikipedia
- GitHub - gurugio/lowlevelprogramming-university: How to be low-level programmer - definitive resources list - Hardware, firmware - Linux kenel and device driver programming - Implementing own Kernel - busybox, filesystem - Assembly languages resources - awesome
- GitHub - Maijin/awesome-asm: A curated list of awesome Assembler
- GitHub - gurugio/book_assembly_8086
- Why is the assembly language called so? - Quora
- Opcode - Wikipedia
- Assembly language - Wikipedia
- Executable and Linkable Format - Wikipedia
- What does an object file contain? - Stack Overflow
- objdump - Wikipedia
- Core dump - crash dump, memory dump, or system dump - Wikipedia
- Binary file - Wikipedia
- Machine code - Wikipedia
- Hex dump - Wikipedia
- binary - Are binaries portable across different CPU architectures? - Unix & Linux Stack Exchange
- NOP (code) = no-op = NOOP - No Operation Assembly Instruction - Programming and Network Protocols - NOP slide - Wikipedia
- Function prologue and epilogue - enter, leave, call, ret - Wikipedia
Archs_Comparison
- difference memory segments architectures - Google Search
- What is the actual difference between x86, ARM and MIPS architectures? RISC vs CISC, security, virtualization - class of ISA, register-memory vs load-store, memory addressing, addressing modes, types of sizes and operands, control flow instructions, ISA encoding
- ARM vs X86 - Key differences explained! - Android Authority
- The Differences Between ARM and Intel x86 - Make Tech Easier
- What's the difference between ARM and x86 processors? - RISC vs CISC
- DEFINITIVE RISC vs. CISC comparison
- Understanding the Differences Between ARM and x86 Processing Cores - News
- What is the difference between AVR and ARM? - Quora
- [Discussion] Are AMD and Intel the only two companies that have their processors out? If so, why are there no other companies? If not, then why are they not being suggested? : buildapc
- Arm vs x86: more choices, tougher decisions | Anders Electronics
- Why is it that most Single-board computers are ... | element14 | Raspberry Pi
- Why x86 is Still Relevant to Embedded Engineers
- ARM vs x86: Is x86 dead?
- Open access to the Proceedings of the 27th USENIX Security Symposium is sponsored by USENIX.Inception: System-Wide Security Testing of Real-World Embedded Systems Software
- Processor design - Wikipedia
- Instruction set architecture - Wikipedia
- Reduced instruction set computer - Wikipedia
- Complex instruction set computer - Wikipedia
- Von Neumann architecture - Wikipedia
- The final ISA showdown: Is ARM, x86, or MIPS intrinsically more power efficient? - Page 2 of 3 - ExtremeTech
- cpu - Is x86 RISC or CISC? - Stack Overflow
- An Engineer's Options & Futures: Intel x86 Processors – CISC or RISC? Or both??
- architecture - What does the 'R' in x64 register names stand for? - Software Engineering Stack Exchange
- Instruction cycle - aka Fetch–Decode–Execute cycle or simply the Fetch-Execute cycle - where is an instruction held when loaded by a CPU - Fetch, Decode, Execute, Repeat Cycle/Loop - Booting process, ROM, boot sequence, startup code - Program Counter PC, Memory Address Register MAR, Memory Data/Buffer Register MDR/MBR, Current Instruction Register CIR, Control Unit CI, ALU, FPU - instuction pipeline, concurrency, parallel/multithreaded execution
- CPU Cores vs Threads - TechSiting
- What Are Threads in a Processor? vs Core - CPU
- Differences between physical CPU vs logical/virtual CPU vs Core vs Thread vs Socket/Connectors
- multithreading - Threads vs Cores - Stack Overflow
- multiprocessor - So what are logical cpu cores (as opposed to physical cpu cores)? - HyperThreading
- Instruction Pipelining in RISC CPUs
- Load–store architecture - ISAs that divide instructions into memory access (load and store between memory and registers), and ALU operations (which only occur between registers) - Examples RISC instruction set architectures such as PowerPC, SPARC, RISC-V, ARM, and MIPS, and GPUs as well - vs CISC/x86 ISAs
- Register memory architecture - ISAs - operations to be performed on (or from) memory, as well as registers.[1] If the architecture allows all operands to be in memory or in registers, or in combinations, it is called a "register plus memory" architecture - Examples of register memory architecture are IBM System/360, its successors, and Intel x86. Examples of register plus memory architecture are VAX and the Motorola 68000 series.
- computer architecture - Where does the CPU get its first instructions from? - boot sequence, startup code, ROM memory - Fetch Execute instruction cycle
- Load–store unit - LSU
- Processor (computing) - CPU architectures, models - definitive outline
- Instruction register = IR = Current Instruction Register = CIR - CPU's control unit CU - microcode circuits - In the instruction cycle, the instruction is loaded into the instruction register after the processor fetches it from the memory location pointed to by the program counter PC (RIP/EIP)
Data_Representation
Information_Theory
- Scientists discover new mechanism for information storage in one atom
- Information theory - Wikipedia
- Entropy (information theory) - Wikipedia
Endianness
Comparison_Endianness_Orderings
- War between little and big endian
- architecture - What is the advantage of little endian format? - Software Engineering Stack Exchange
- What are the advantages of using Big Endian over Little Endian in a computer architecture? Why do some designers decide to use Big Endian? - Quora
- Big-Endian “is effectively dead” | Hacker News
- Little-endian vs. big-endian | The ryg blog
- computer science - Why are both little- and big-endian in use? - Stack Overflow
- Why were microprocessors built as big or little endian? Why did Intel choose little endian architecture? - Quora
- endianness - What are the benefits of the different endiannesses? - Stack Overflow
- Is Big or Little Endian better, and why? - Quora
- Little Endian vs Big Endian – The Bit Theories
Handling_Data_Endiannes_in_Code
- Writing Endian Independent Code in C++ - General and Gameplay Programming - GameDev.net
- How to write endian agnostic C/C++ code? - Stack Overflow
- byte - C program to check little vs. big endian - Stack Overflow
- endianness - How do I convert between big-endian and little-endian values in C++? - Stack Overflow
- The byte order fallacy
- Endianness - Little/Big/Bi-Endian - Byte Order - Bit Endianness/Order
- cpu - What determines endianness - Super User
- endianness - How to check whether a system is big endian or little endian? - Stack Overflow
- architecture - C Macro definition to determine big endian or little endian machine? - Stack Overflow
- What is LITTLE-ENDIAN and BIG-ENDIAN coversions? - Quora
- Big Endian / Little Endian
- byte - Is there a oneliner that converts a binary file from little endian to big endian? - Unix & Linux Stack Exchange
- architecture - Why is x86 little endian? - Stack Overflow
- x86 64 - So on x86-64 it's big endian? - Stack Overflow
- 64bit - Is there any "standard" htonl-like function for 64 bits integers in C++? - Stack Overflow
- c++ - Detect endianness of binary file data - Stack Overflow
Data_Alignment-Memory_Access_Granularity
- CPU and Data alignment - Stack Overflow
- Data structure alignment - data alignment, data structure padding, and packing - Wikipedia
- c++ - What is data alignment? Why and when should I be worried when typecasting pointers in C? - Stack Overflow
- assembly - Why data alignment is used exactly? - Software Engineering Stack Exchange
- architecture - Confused about data alignment - Stack Overflow
- assembly - Why does System V / AMD64 ABI mandate a 16 byte stack alignment? The historical 4-byte stack alignment was also insufficient for efficient 8-byte double on modern CPUs
- Word Alignment
- x86 - Memory alignment on a 32-bit Intel processor -SIMD - cache lines
- definitive - Why do processors need memory alignment - Purpose of memory alignment - Atomicity, Concurrency - CPU Cache Lines - PIO vs DMA
- Data Alignment - Memory access granularity - Definitive visual explanation with diagrams - natural boundaries - __declspec(align(16))) - SSE Streaming SIMD Extensions
- Data alignment for speed: myth or reality? ARM vs x86 aligned/misaligned data - Performance Test of program using misaligned data
- c - Does unaligned memory access always cause bus errors? performance overhad, slower - x86/x64 support misaligned data while IA-64 Itanium does not - Emulation - Stack Overflow
- c - Does unaligned memory access always cause bus errors? performance overhad, slower - x86/x64 support misaligned data while IA-64 Itanium does not - Emulation - Stack Overflow
- Data Alignment Fundamentals: Straighten up and fly right - Single/Double/Quad Memory Access Granularity - Purpose of Multi-Bytes Granularity - How does a processor/cpu see the memory – definitive in-depth article, visual explanation with diagrams - Lazy processors - Performance, speed - PowerPC, Motorola 68000, MIPS
- c++ - How to find out memory access granularity ? - Stack Overflow
- c - What does it mean to align the stack? Stack Alignment on 16-byte boundaries for SSE instructions performance
- Double-byte memory access granularity - Memory Alignment, natural boundaries
Stack_Alignment
- disassembly - What is the purpose of these instructions before the main preamble? definitive and best explanation - C Stack Frames, C Runtime Environment, Linux Process Anatomy, _lib_start_main(), __gmon_start__(), diagram of program start up execution from loader to main- detailed memory segments model : memory mapping segment, kernel space, bss, data, text segments - main argument argc in ecx register - 16-bytes memory alignment of main function stack frame - _start(), __libc_start_main(), __libc_csu_init() functions - Reverse Engineering Stack Exchange
- disassembly - basic reversing question about local variable - memory alignment, function preamble/prologue in assembly x86, i386 ABI - definitive in-depths explanation - -mpreferred-stack-boundary gcc default alignment
- c - Why does CPU access memory on a word boundary? granularity, hardware related reasons - definitive - purpose - IA-32 x86 vs Itanium IA-64 - boundary setting
- c++ - why 128 bit/16 bytes variables should be aligned to 16 Byte boundary - memory page, data/stack alignment - definitive explanation of the reasons - hardware limitations - SSE2 instructions on x86 - _m128i type, SIMD - hardware support for misaligned data, movups - performance purposes - CPU memory access granularity
- computer architecture - Advantage of byte addressable memory over word addressable memory - Computer Science Stack Exchange
- definitive - Why is memory alignment needed? CPU memory access granularity - byte oriented
- Memory Alignment - visual epxlanation
- Memory access and alignment - consequences of misalignment across CPU architectures - ARM, c86 - memory access granularity
- c - Why does compiler align N byte data types on N byte boundaries? alignment, natural boundaries -
- Does aligning memory on particular address boundaries in C/C++ still improve x86 performance? definitive - alignment, SIMD - alignas
- Aligned vs. unaligned memory access - hardware, measurements, implementation
- Design Principles - on memory alignment performance
- c++ - Can modern x86 hardware not store a single byte to memory? - byte addressing/addressable vs word - C++ memory model - multithreading/concurrency - RMW - atomic/non-atomic - CPU cache line, L1D - MMIO -
- performance - Are there any modern CPUs where a cached byte store is actually slower than a word store? - Stack Overflow
- c++ - Why is integer assignment on a naturally aligned variable atomic on x86? natural alignment - data alignment - std::atomic, stdatomic
- Structure packing with the GNU C compiler - #pragma pack
- Memory alignment is always power of 2 - access granularity - x86 vs ARM unaligned/misaligned data reading - performance cost - page granularity
- operating system - Basic boot terms - Stack Overflow
Numeral_Systems_Used_In_Computers
Binary_Positional_Numeral_System
Logic_Gates-Bitwise_operations
- Logic gate - Wikipedia
- Instruction pipelining - Wikipedia
- Bit array - bit map, bit set, bit string, or bit vector - C++ std::vector<bool>, std::bitset
- Bit Array in C++ - std::bitset vs std::vector<bool>
- Performance of C++ Bit-vector Implementations - bit set - boost dynamic bitset - std vector char - Qt::QBitArray
- Bit Shift and Bitwise Operators
- https://cybergibbons.com/uncategorized/bitwise-operations-or-how-i-learned-to-stop-worrying-and-love-my-compiler/
- Low Level Bit Hacks You Absolutely Must Know - good coders code, great coders reuse - bitwise - definitive tricks
- Bitwise operation - Wikipedia
- Bits, Bytes, Building With Binary - bitwise
- Bit - aka shannon
- 8-bit - Wikipedia
- Nibble - Wikipedia
- Octet (computing) - Wikipedia
- Bit numbering - Least Significant Bit/Byte LSB, Most Significant Bit/Byte MSB - LSBit/LSByte, MSBit/MSByte - Wikipedia
- Binary number - binary arithmetics : addition, substraction, multiplication, division - tow's complement, signed representation - Wikipedia
- Mask (computing) - Wikipedia
- Signed number representations - Sign-and-Magnitude, Two's representation, Ones Representation - Offset Binary - Negative base - Wikipedia
- Ones' complement - Wikipedia
- Two's complement - sig bit
- Sign bit - MSB - most signifcant bit - two's complement - Wikipedia
- Signedness - Integer literals, U suffix - Comparison between signed and unsigned - Wikipedia
- Binary Subtraction with 2's Complement - Stack Overflow
- Exclusive or - Wikipedia
- XOR -- from Wolfram MathWorld
- definitions2.pdf
- binary - two's complement, why the name "two" - Stack Overflow
- Digital Electronics - Ones & Twos Complement
- numeral representations - Why octal and hexadecimal? Computers use binary and humans decimals - Computer Science Stack Exchange
- Why do we use octal number systems? And where do we apply octal number systems? - Quora
- Why is a byte EXACTLY 8 bits? - Quora
- hardware - What is the history of why bytes are eight bits? - Software Engineering Stack Exchange
- Is a byte always 8 bits? - Stack Overflow
- Why is 1 Byte equal to 8 Bits? - Stack Overflow
- radix math theory - Google Search
- Two's Complement - proof, examples
- Binary: Plusses & Minuses (Why We Use Two's Complement) - Computerphile - YouTube
- binary - Why Two's Complement works - Mathematics Stack Exchange
- computer science - Why Two's Complement? - Stack Overflow
- binary - Why prefer two's complement over sign-and-magnitude for signed numbers? definitive explanantion about negative MSB choice in Rpant's answer - Stack Overflow
- Two's Complement - fundamentals, definitive academic breakdown - comparison againt radix 10 arithmetic
- Mathematics of computer integers – The Mindful Programmer
- Why We Use Two’s Complement – The Mindful Programmer
- How integers are stored in memory using two’s complement. -.2’s complement wheel
- What is “2's Complement”? - Stack Overflow
- arithmetic - Subtraction when second number is bigger than first number - ten's complement vs two's complement - Mathematics Stack Exchange
- arithmetic - Subtraction by addition - nines complement, ten's complement - Mathematics Stack Exchange
- Unsigned Integer Binary Subtraction - negative substraction - Mathematics Stack Exchange
- Why does the "flip the bits and add 1" two's complement conversion method work? definitive explanantion, comparison with base 10, 10's complement : learnprogramming
- Understanding the most and least significant bit - parity bit, error detection
- integers - Alternative decimal number representation - 10-adic representation, ten's complement vs two's complement - Mathematics Stack Exchange
- proof verification - Subtraction with a negative result - Mathematics Stack Exchange
- Proof involving two's complement arithmetic of binary numbers - Mathematics Stack Exchange
- A formal approach to twos complement binary representation of integers - definitive formal mathematical proof - Geometric Series formula | Mauro Bringolf
- Binary arithmetic proof with two's complement - Mathematics Stack Exchange
- Overflow & Underflow - Binary arithmetics - YouTube
- math - What are arithmetic underflow and overflow in C? - Stack Overflow
- The CARRY flag and OVERFLOW flag in binary arithmetic - definitive academic course - signed vs unsigned integer arithmetics - CPU ALU Arithmetic Logical Unit - Very detailed explanation of Overflow and Carry flags evaluation techniques - automated ways of detecting overflow errors in two's complement binary arithmetic - definitive in-depth detailed academic course - "overflow" in English language vs overflow flag - unsigned vs signed arithmetic
- Carry and borrow (arithmetic) - carry flag/bit - Wikipedia
- Arithmetic Operations on Binary Numbers -Overflow/Carry rules for addition, substraction, multiplication and addition
- What is the difference in carry and overflow flag during binary multiplication? - definitive breakdown - signed vs unsigned integer arithmetics with respect to difference between OF and CF - ALU - Quora
- Carry flag - Wikipedia
- assembly - How does an adder perform unsigned integer subtraction? definitive formal proof of borrow in substraction VS carry in corresponding two's complemented addition - unsigned vs signed integer arithmetic - Stack Overflow
- x86 64 - Assembly x86-64 setting carry flag for sub instruction - definitive answer - equivalence overflow flag in substraction VS carry flag in corresponding two's complement addition - unsigned vs signed integer arithmetic - Stack Overflow
- math - Arithmetic Overflow vs. Arithmetic Carry - unsigned vs signed integer arithmetic - Stack Overflow
- math - carry/overflow & subtraction in x86 - every possible combination of the 4 arithmetic flags OF, SF, ZF, CF that can result from the ADD and SUB instructions on x86 - Stack Overflow
- Arithmetic underflow - Regarded as negative overflow - Integer overflow/wraparound - Wikipedia
- binary - Arithmetic Overflow and Underflowing - Overflow in signed integer arithmetics - Mathematics Stack Exchange
- hex - What is a borrow in hexadecimal subtraction? (Assembly) - definitive explanation with great examples, carry in, carry out, borrow, raw carry - Stack Overflow
- language agnostic - Single most effective practice to prevent arithmetic overflow and underflow - Stack Overflow
- Two’s Complement Representation: Theory and Examples
- 2's-Complement Binary Numbers- proof
- arithmetic - Prove decimal number pattern for its n-bit 2's compliment - proof - Mathematics Stack Exchange
- Overflow flag - V flag - definitive breakdown - SF xor OF - Wikipedia
- Signed zero - Wikipedia
- Sign extension/propagation - x86 and x64 instructions CBW, CWD, DWDE, CDQ, move with sign extension MOVSX - Zero Extension with MOVZX instruction -
- who had the idea of sign bit binary at DuckDuckGo
- Binary prefix - Wikipedia
- Binary data - Wikipedia
- Boolean algebra - bitwise
- How does the CPU know we are using one's complement or two's complement for representing negative numbers? IEEE 754 floating point unit FPU - definitive - microcodes - ALU
- cpu - How does a computer deal with subtraction of 2 values that are in two's complement? logic gate
- redundant binary representation (RBR) is a numeral system that uses more bits than needed to represent a single binary digit so that most numbers have several representations. An RBR is unlike usual binary numeral systems, including two's complement
- shannon (unit) - aka bit
- Three-valued logic - ternary logic
- Kilobyte - kibibytes
- computer architecture - how 16 bits address lines address 64KB? why 64 KB = 65536 bytes - definitive
- Computer number format - Binary, Octal, Hexadecimal, Base64 - Conversion between bases - Fraction representation through Fixed-point numbers and Floating-point numbers - Wikipedia
- Hexadecimal - Wikipedia
- Base64 - MIME - UTF-7 - OpenPGP - Wikipedia
- Zero-based numbering - Wikipedia
Character_Set_Encoding_Formats
- unicode - UTF-8, UTF-16, and UTF-32 - Stack Overflow
- The differences between ASCII, ISO 8859, and Unicode
- Unicode - Wikipedia
- UTF - Unicode Transforamtion Format - UTF-1 UTF-7 UTF-8 UTF-16 UTF-32
- UTF-8 Everywhere - definitive comparison between UTF-8/16/32, ASCII - wchar_t, C++
- c++ - What is the difference between "Wide character" set and "Unicode character set"? - wchar_t
- encoding - ascii vs unicode vs utf - What is Unicode, UTF-8, UTF-16? definitive breakdown/comparison - Unicode code point - ISO 8859-1, ASCII - Basic Multilingual Plane (BMP) - endiannes
- The Absolute Minimum Every Software Developer Absolutely, Positively Must Know About Unicode and Character Sets (No Excuses!) – definitive - ascii, unicode, utf, encoding
- character encoding - Unicode, UTF-7/8/16/32, ASCII, ANSI format differences - definitive - code point - Basic Multilingual Plane (BMP)
- What's the difference between ASCII and Unicode? ASCII Origin, rise of Unicde - definitive historical summary - UTF-8/16/32 - ASCII Extended
- What-are-the-similarities-and-differences-between-7-bit-and-8-bit-ASCII - extended ASCII
- ASCII - control/printable characters - 7 bit vs 8 bit codes
- List of information system character sets -
- Extended ASCII - Extended ASCII (EASCII or high ASCII) character encodings are eight-bit or larger encodings that include the standard seven-bit ASCII characters, plus additional characters - 8 bits
- Ternary numeral system - balanced ternary system, comprising the digits −1, 0 and +1, used in comparison logic and ternary computer - base/radix 3 - high z - ternary digit trit - vs binary, senary, decimal - Nonary (base 9, each digit is two ternary digits) or septemvigesimal (base 27, each digit is three ternary digits) can be used for compact representation of ternary, similar to how octal and hexadecimal systems are used in place of binary - Some ternary computers such as the Setun defined a tryte to be six trits or approximately 9.5 bits (holding more information than the de facto binary byte)
- Balanced ternary - non-standard positional numeral system (a balanced form), used in some early computers[1] and useful in the solution of balance puzzles.[2] It is a ternary (base 3) number system in which the digits have the values –1, 0, and 1, in contrast to the standard (unbalanced) ternary system, in which digits have values 0, 1 and 2.
- Signed-digit representation - balanced form
- High impedance - aka hi-Z, tri-stated, or floating
- Ternary computer - optical computers - Donald Knuth opinion
- Why does RAM come in specific sizes (256, 512, 1024, 2048, etc) - definitive
- Why binary and not ternary computing? - SQL trinary/terary logic - radix economy
- Power of two - permutation of n bits, arranging - definitive on RAM/memory measure/size
- Data (computing) - Wikipedia
- how are bytes represented in binary file at DuckDuckGo
- Binary code - Wikipedia
- hexdump - Why don't you see binary code when you open a binary file with text editor? - Super User
- What are the weird characters onscreen when one opens an exe file using a text editor? - Quora
- binaryfiles - What exactly causes binary file "gibberish"? - Stack Overflow
- hexadecimal - Why are hex editors called binary editors? - Super User
- If texts are also fundamentally bytes, what is the difference between a text and a byte/binary file? - Quora
- What is the advantage of storing data in binary format rather than text files? - Quora
- Converting Between Binary, Octal, Decimal, and Hexadecimal Number Systems - Robot Room
- Hexadecimal system: describes locations in memory, colors
- 02-bits-ints-part1.pdf
- Why Binary Files are Needed
- memory hardware - How does a computer determine the data type of a byte? - Computer Science Stack Exchange
- How does my computer store things in memory?
- Binary-coded decimal - BCD - Wikipedia
- Integer (computer science) - Wikipedia
- Fixed-point arithmetic - Wikipedia
- Floating-point arithmetic - Wikipedia
- Orders of magnitude (data) - powers of two VS powers of ten - Wikipedia
- ROM image - hacking - security - reverse engineering
- System image - disk / process image - core dump
- Binary File Descriptor library - BFD - core dump, used in gnu binary utils binutils tools, gnu assembler GAS, gnu linker, gnu debugger gdb
- Byte - historical development - non 8 bit byte machines - smallest addressable unit of memory in many computer architectures
- 65,535 - TCP/UDP ports number
- 65,536 - Wikipedia
CPU_Internal_Storage-Memory
CPU_registers
- cpu cache vs register at DuckDuckGo
- Are CPU registers and CPU cache different? - Stack Overflow
- Processor register - Wikipedia
- linux - Understanding cpu registers - Stack Overflow
- x86 - How are the segment registers (fs, gs, cs=code segment, ss=stack segment, ds=data segment, es=extra segment) used in Linux? - Reverse Engineering Stack Exchange
- terminology - What are CPU registers? - Software Engineering Stack Exchange
- Processor register - Wikipedia
- Memory address register - Wikipedia
- Explain role of different registers like IR, PC, SP, AC, MAR and MDR used in $V_{nn}$ Neumann model.
- microcontroller - difference between memory address register(MAR) and program counter(PC)? - Stack Overflow
- cpu - What is the difference between "Memory address" and "Program counter" registers? - Super User
- Whats the logic between MAR, MBR registers and Control Bus -
- instruction cycle - Program Counter PC and Instruction Register IR - RISC/CISC ISAs - Sparc, Intel, AMD - IA-32/x86-64
- Index register - Wikipedia
Memory_Caches
- CPU cache - cache lines, cache blocks - Address translation - Multi level cache
- Cache (computing) - Hardware Cache
- definitive - cpu architecture - What does a 'Split' cache means. And how is it useful(if it is)? L1 Cache - Instruction/Data caches - Modified Harvard VS Von Neumann architecture -
- What is L1 (Level 1 Caching)? primary cache
- What is L2 Cache (Level 2 Cache)? external/secondary cache
- Memory part 2: CPU caches - L1, L2, L3 - definitive technical in-depth explanation
- How L1 and L2 CPU Caches Work, and Why They're an Essential Part of Modern Chips - ExtremeTech
- cpu - How can cache be that fast? - definitive - L1 cache - Peter Cordes answer
- Translation lookaside buffer - TLB - instruction translation lookaside buffer (ITLB) and a data translation lookaside buffer (DTLB) - Address-space/context/process/thread switch - Meltdown security vulnerability - kernel page-table isolation (KPTI) - memory-management unit (MMU) - translations of virtual memory to physical memory - paged or segmented virtual memory - content-addressable memory (CAM)
Arithmetic_Logical_Unit
- Arithmetic logic unit - Wikipedia
Assembly_To_Hardware_Translation
Microcodes
- computer architecture - How does a CPU 'know' what commands and instructions actually mean? hard-programmed microcode/microprogram control unit - interface between abstract assembly instructions and physical electric logic - Super User
- Microcode - Microprogram control unit vs hardwired control unit - Wikipedia
- When a computer reads binary, how does it know what to do? : askscience
- Control unit - CU - hardwired control unit vs microcode/microprogram control unit - Von Nuemann Architecture
- assembly - How does binary translate to hardware? - Stack Overflow
- how are bytes represented on hardware at DuckDuckGo
Firmwares-Bootloaders
Boot_Process
- Bootloader - Single/Two Stages/Mixed Bootloader - multi stage
- How to Setup Network Bootable Utility Discs Using PXE
- architecture - Do bare computer systems (without OS installed) use (executable) files? - BIOS
- How Computers Boot Up - bootloader, grub, MBR, boot sector, BIOS - definitive breakdown - faulty CPU troubleshooting, diagnostics - bootstrap processor (BSP) - initial address in Instruction Pointer register EIP 0xffffff00 reset vector
- What is Boot?
- DEFINITIVE - Inside the Linux boot process – MBR - first/second stage bootloader
- bootloader - primary and secondary boot loaders - first/second stage bootloader
- android - what is the need of second stage boot loader ? why different bootloaders like first stage and second stage? multi/single stage boot process - embedded systems limitations
- Reset vector - CS/IP regeister - segmented/physical address
- DEFINITIVE - what is the use of SPL (secondary program loader) - definitive visual explanation, memory layout - vs First/Second Stage Bootloader - ROM code, U-Boot SPL - embedded , IoT, BIOS, MBR - static RAM vs SDRAM, DMM
- TPL = Tertiary Program Loader - SPL loading SPL(and, SPL as just another U-Boot config)
- linux - Why do we need a bootloader in an embedded device? - Stack Overflow
- DEFINITIVE - What is the difference between a Bootrom vs bootloader on ARM systems - Boot ROM, ROM Code
- boot - What is the difference between primary and secondary bootloader? - Super User
- DEFINITIVE - boot - How does the CPU execute instructions stored in a motherboard's flash memory chip? - ROM code, reste vector, XIP Execute In Place - BIOS ROM - Cache-as-RAM
- Boot Process - definitive - reset vector - Z80 cpu example
- The Boot Process - 1) ROM Code 2) SPL (or Secondary Program Loader) 3) U-BOOT 4) Linux Kernel
- Why does BIOS needs to load first stage boot loader from MBR, but this is not the case with UEFI? GPT, UEFI, first/second stage bootloader
- DEFINITIVE - What memory is used for storing the reset vector? - bios, boot process
- boot - What is the booting process for ARM? - Stack Overflow
- ubuntu - how sabre sd boots directly from uboot without SPL - Stack Overflow
- Comparison of boot loaders - syslinux, grub, lilo
- bootstrap loader vs bootloader - Google Search
- where does the term bootstrapping come from - Google Search
- bootstrap loader vs bootloader - Google Search
- firmware vs bootloader at DuckDuckGo
- Firmware vs Operating System OS vs Boot loader - ROM memory, EEPROM, BIOS, flash memory
- Bootloader and Firmware Common Usage and ... - Stack Overflow
- bootloader - What is the difference between boot loader and ...
- ttps://github.com/tuhdo/
- why a cd directly bootable and a usb is not - Google Search
- how is alarm kept active when smartphone is off - Google Search
- How to Clear CMOS (AKA Reset BIOS Settings)
- The PC BIOS will be killed off by 2020 as Intel plans move to pure UEFI | Ars Technica
- What Is Meant By Firmware, Stock & Custom ROMs And Flashing [Guide]
- Flashing Firmware
- What is “Flashing the BIOS”? BIOS chip - BIOS update - POST Power-On-Self-Test - HDD, SSD - - Super User Blog
- Booting - bootstrap loader BSL, boot sequence - first stage bootloader as coreboot, libreboot , das u-boot - second stage bootloader as grub, bootmgr, syslinux, ntldr, bootx - embedded systems booting on ROM/Flash memory - POST power on self test - secondary program loader SPL
- BIOS boot partition - partition on a data storage device that GNU GRUB uses on legacy BIOS-based personal computers in order to boot an operating system, when the actual boot device contains a GUID Partition Table (GPT). Such a layout is sometimes referred to as BIOS/GPT boot
- System partition and boot partition - Wikipedia
- Arch boot process -In order to boot Arch Linux, a Linux-capable boot loader must be set up. The boot loader is responsible for loading the kernel and initial ramdisk before initiating the boot process. The procedure is quite different for BIOS and UEFI systems - ArchWiki
- Multi-booting - Boot manager - act of installing multiple operating systems on a computer, and being able to choose which one to boot. The term dual-booting refers to the common configuration of specifically two operating systems. Multi-booting may require a custom boot loader.
- Embedded Linux Booting Process (Multi-Stage Bootloaders, Kernel, Filesystem) - YouTube
- A Detailed Look at the Boot Process
- GNU GRUB - GNU GRand Unified Bootloader
- Grub4dos tutorial - Grub4Dos Wiki - bootloader
- Boot chains overview - stm32mpu - boot process - definitive in depth breadown
- Configure the boot loader - MBR - BIOS - Flash memory/ROM
- Basics of boot loader - definitive simple breakdown - first/second stage - boot sequence/sector - BIOS
- Linux Boot process tips - BIOS, first/second stage boot loader - /boot folder/partition
- How Boot Loaders Work - boot sector - LILO, GRUB - chain loading
- DEFINITIVE - The Boot Process on AM335x Arm Cortex-A8 processor board - Texas Instruments Wiki - Multi stage boot process - 4 stages : ROM Code, SPL Second Program Loader, U-Boot, Kernel - Linux Kernel boot on embedded platform - POR Power On Reset
- The boot process - Windows vs Linux - boot loaders
- Definition of More About First-stage Boot Loaders | Chegg.com
- Second Stage Boot Loader
- what is the difference between these thing firmware ,boot loader and driver - firmware vs bootloader - simple explanation
- DEFINITIVE - How does a boot manager work and work differently on BIOS and UEFI machine? ROM, Flash, grub, reFInd - bootloaders definition
- What is the difference between a boot loader and a boot manager? - Quora
- Open Firmware - EFI predecessor
- arm - What are ATAGs for a device that uses Linux Kernel? - ARM Tags
- boot - Are there any booting standards for ARM-based computers? - Super User - boot process
- arm - How to add customised ATAG variable in U-Boot and Linux kernel? - Stack Overflow
- ARM Linux and ATAGS - boot loader, devide tree file DTB
- Booting ARM Linux
- RAM image - ROM, embedded system, bootloader
Interrupts-System_Calls
- Polling vs. Interrupt
- interrupt vs system call at DuckDuckGo
- In an operating system, what is the difference between a system call and an interrupt? - Stack Overflow
- Interrupt - Wikipedia
- linux - What is "process context" exactly, and how does it relates to "interrupt context"? context switch, cs register (code segment) - interrupt descriptor table - context switch
- c - Context switching in function vs interrupt call? - isr
- What is the difference between context switching and interrupt handling?
- hardware - Kernel and User space System Calls - several ways of going to a higher privilege, at least three types: system calls (when user code explicitly switches to kernel mode), interrupts (when a peripheral signals the processor that it should do something), and traps (when the processor attempts to execute invalid cide, e.g. access to unmapped memory or an unknown instruction)
- linux - What is difference between User space and Kernel space? - definitive - system calls - cpu rings description, Ring 0 (kernel mode), Ring 1 (may be used by virtual machine hypervisors or drivers), Ring 2 (may be used by drivers, I am not so sure about that though). Ring 3 is what typical applications run under. It is the least privileged ring, and applications running on it have access to a subset of the processor's instructions. Ring 0 (kernel space) is the most privileged ring, and has access to all of the machine's instructions - interrupt handler - examples of x86 privileged assembly instructions lgdt to load the global descriptor table or hlt to halt a processor - High/Low Memory - PAE
- Interrupts - definitive — The Linux Kernel documentation
- Why are System calls also called 'traps'? - PDP 11
- c - How does a system call work - definitive visual explanation
- microcontroller - What is the difference between context switching and interrupt handling? ISR Interrupt Service Routine
- Handling Interrupts - Open Source For You
Process_Scheduling
- Create Shortest Job First Scheduling Algorithm in C
Concurrency-Multithreading
Context_Switch
- Context switch - Wikipedia
- multithreading - What is a context switch? - Stack Overflow
- do processes share same cpu registers at DuckDuckGo
- process - Running multiple processes on a single CPU - Stack Overflow
- linux - Why is it quicker to switch between threads than to switch between processes and share data between them? - Super User
- operating systems - Does a context switch happen when a process has terminated? - Computer Science Stack Exchange
- Do system calls always means a context switch? - Computer Science Stack Exchange
- What is Context Switching in Operating System?
- OS scheduling and The anatomy of a context switch
- Tasks, the context switch, and interrupts - Embedded.com
- Context switching
- Interrupt handling and context switching
- Context Switching - OSDev Wiki
- Interrupts and Context Switching - Kaedrin Weblog
- Measure the time spent in context switch? - GeeksforGeeks
- Context Switch definition - mode switches - cpu
- ARM Cortex-M RTOS Context Switching | Interrupt
- Measuring context switching and memory overheads for Linux threads - Eli Bendersky's website
- Evolution of the x86 context switch in Linux – MaiZure's Projects
- multithreading vs parallel computing at DuckDuckGo
- Parallel computing - Wikipedia
- multithreading - How does a single thread run on multiple cores? - multithreading hardware cpu multi-core - time slice
Parallel_Computers-SIMD
- SIMD - Single Instruction Multiple Data - Wikipedia
- Streaming SIMD Extensions SSE - SIMD (Single Instruction, Multiple Data, pronounced "seem-dee") computation processes multiple data in parallel with a single instruction, resulting in significant performance improvement; 4 computations at once. SSE defines 8 new 128-bit registers
- What's the difference between a microcontroller and a ...
- Core vs CPU vs Socket vs Chip vs Processor Difference Comparison
- CPU socket - Wikipedia
- Processing the Page Turn | The CPU Shack Museum
- Explained: What's the Difference Between Intel Core i3, i5 and i7?
- Memory access and CPU cycles - For Beginners - GameDev.net
- CPU Speed and Cycles? - Super User
- What is the use of mutex lock for integer variables - Coding Security
- This Guy Designed and Built an 8-bit CPU from Scratch - Motherboard
- Intel® Software Developer Zone
- memory - How does the CPU know when it received RAM data and instructions? - Software Engineering Stack Exchange
- Is RAM size or processor speed more important? - Quora
- What are threads, and what do they do in the processor? - Super User
- z80 - How did 8 bit processors perform 16 bit arithmetic? data bus, register width - 4 bits width ALU - Retrocomputing Stack Exchange
- How does a processor know how many bytes to read from memory? (and other questions) : askscience
- Soft microprocessor - CPU - soft microprocessor (also called softcore microprocessor or a soft processor) is a microprocessor core that can be wholly implemented using logic synthesis. It can be implemented via different semiconductor devices containing programmable logic (e.g., ASIC, FPGA, CPLD), including both high-end and commodity variations
- arm processor vs intel processor - Google Search
Buses
- Bus (computing) - Wikipedia
- Control bus - Wikipedia
- Memory bus - Wikipedia
- System bus - Wikipedia
- cpu architecture - Difference between memory bus and address bus - memory bus = data bus - Stack Overflow
- Address bus - Wikipedia
Data_Storage-Memories
Primary_Storage-Main_Memory
Random_Access_Memory-RAM
Memory_Management
Memory_Management_Unit
- microprocessor - Role of the Memory Management Unit - Electrical Engineering Stack Exchange
- Memory Management
- Memory management (operating systems) - Wikipedia
- Memory management unit - MMU - paged PMMU
- Computer memory - types of memory : Volatile as RAM, Non-Volatile as ROM, NVRAM, etc - Wikipedia
- primary memory
- symbol table -- wikipedia
- Memory segmentation - Wikipedia
- Data segment - Wikipedia
- Segmentation and paging - Memory Management - pdf - Junfeng Yang
- Call stack - aka execution stack, program stack, control stack, run-time stack, or machine stack - unwinding - frame pointers
- .bss - Wikipedia
- computer architecture - How does CPU actually retrieve data from memory when you call a variable in a programming language? - Computer Science Stack Exchange
- compilers - How do computers remember where they store things? - Computer Science Stack Exchange
- What Every Programmer Should Know About Memory - cpumemory.pdf
Virtual_Memory
- Virtual memory - RAM, DASD - Paged virtual memory, page tables, paging supervisor, pinned pages - thrashing - segmentation - address space swapping
- Virtual Memory Tricks · Our Machinery
- memory fragmentation - Google Search
- Direct memory access - Wikipedia
- x86 64 - Address canonical form and pointer arithmetic - mmap, virtual memory, virtual address space - Stack Overflow
Memory_Paging-Swapping
Swapping
- linux - swap partition vs file for performance? - Server Fault
- hibernate - swap partition vs swap file - Ask Ubuntu
- swap partition vs swap file |
- Ubuntu Linux: Create swap file - dd command
- linux - Swap: Better to create a dedicated swap partition or to create a swap file? definitive simplest explanation
- I have 16GB RAM. Do I need 32GB swap? - Ask Ubuntu
- How Much Swap Should You Use in Linux? - It's FOSS
- Paging - Wikipedia
- operating system - Can someone explain this diagram on Paging (virtual memory) to me? - Stack Overflow
- Page (computer memory) - 1 Page size trade-off 1.1 Page table size 1.2 TLB usage 1.3 Internal fragmentation 1.4 Disk access 2 Determining page size
- What exactly is paging in operating systems? - Quora
- memory - What is paging? - Stack Overflow
- memory management - Paging - What is exactly "inside" of a Page? - Stack Overflow
- operating systems - What is Paging in memory management? - Super User
- What is the difference between a 'page' of memory and a 'frame' of memory? - Computer Science Stack Exchange
- kernel - Does Linux not use segmentation but only paging? - Unix & Linux Stack Exchange
- memory management - Is page size always equal to frame size? - Computer Science Stack Exchange
- x86 Paging Tutorial - Ciro Santilli
- Swap - swap file - paging, virtual memory, physical memory/RAM
- memory management - Difference Swapping and Paging - Stack Overflow
- What is difference between paging and swapping? - demand paging, virtual memory implementation - logical vs effective virtual memory
- What is the advantage of paging over swapping? - Quora
- What is the role of paging and swapping files in virtual memory management? - swapped process
- What is swapping in memory management? - paging, pages
- What are the advantages of swapping in memory management? - Quora
- Virtual Memory - Paging or Swapping [Gerardnico]
- What is the Difference Between Swapping and Paging - Pediaa.Com
- Paging vs. swapping - LinuxIntro
- Virtual Memory, Paging, and Swapping « Gabriele Tolomei
- process - What is the difference between paging and context switching? - Unix & Linux Stack Exchange
- Do we really need swap on modern systems? paging, pages - definitive - virtual memory management, overcommitment - thrashing - out of memory - how much swap, swap size
- Page table - store the mapping between virtual addresses and physical addresses.- Virtual addresses are used by the program executed by the accessing process, while physical addresses are used by the hardware, or more specifically, by the RAM subsystem. The page table is a key component of virtual address translation which is necessary to access data in memory.
Memory_Models-Addressing_Schemes
- memory - Flat addressing vs. segmented addressing - near/far pointers, buffer overflows, pointers within same segment vs across different segments - one segment per buffer better for security - JVM uses segmented memory model
- Intel Memory Model - six different memory models of the x86 CPU - ds, cs, ss 16 bits segments - near/far/huge pointers - x86-64
- Protected mode - x86 - privilege levels, rings - CPU security
- Real mode - x86 CPUs - characterized by a 20-bit segmented memory address space - Wikipedia
- Memory address - segment, offset - x86 memory model - physical/logical addresses
- Addressing_mode
- Address space - Address mapping and translation - Parallel ATA/PATA - DNS, ARP examples - virtual memory
- Memory segmentation - segments/sections - with/without paging - x86 - program compilation, linking, loading - object files - process isolation for more reliability - x86-64
- operating systems - Understanding "Flat memory model" and "Segmented memory model" - paged/flat
- linux - Difference between flat memory model and protected memory model? - MMU
- Programming with the Intel architecture in the flat memory model - segmented, protected
- Paging - Wikipedia
- Flat memory model - linear memory model/address space - refers to a memory addressing paradigm in which memory appears to the program as a single contiguous address space - paged memory model, x86 segmented memory model
- cpu - Byte addressable vs bit addressable -
- Byte addressing - memory model - addressable - byte vs octet - historical non 8 bit bytes - PDP-10
- Word-addressable - word machines - vs byte
- Memory address - Logical vs Physical - Word size versus address size - flat/segmented memory models - memory controller bus - address space, memory layout - Addressing schemes - byte/word adressable - memory segmentation - 64-bit address space
- Offset (computer science) - relative address - displacement - base/absolute address
- Base address - relative addressing scheme, absolute address
- Input/output base address - x86 memory model
- Memory model (programming) - race conditions
- memory - Why are RAM module capacities in powers of two (512 MiB, 1, 2, 4, 8 GiB)? - Super User
- memory - Why is RAM in powers of 2? - Stack Overflow
- Memory Management (computer programming): Why is the size of RAM always in powers of 2? - Quora
- Word (computer architecture) - word/byte addressing - memory size power of two
- 16-bit computing - microcode, ALU
- Computer memory - Wikipedia
- c - Why mmap() is faster than sequential IO? - Stack Overflow
- Bank switching - vs paging
- Stack-based memory allocation - LIFO - longjmp, alloca, malloc, _malloca, _freea, alloca_account - stack overflow - x86, PowerPC, MIPS - ABI
- Memory management - external fragmentation - virtual memory - memory protection - shared memory in inter process communication - _malloca, malloc, _freea, alloca_account - recursion
- Fragmentation (computing) - Internal/External - filesystem
- Memory leak - RAII Resource Acquisition Is Initialization - shared memory - C, C++ examples
- programming languages - What is actually the difference between the GNU C Library and the C standard Library? libc vs glibc - C standard, POSIX library - bypassing libc to do system calls - Bones Scheme Compiler, busybox - dlopen, fork - other implementation of the C standard library, musl-libc, dietlibc - vdso
- What is a Memory Module? lternatively referred to as a memory board or memory stick. A memory module is a circuit board that contains DRAM integrated circuits that are installed into the memory slot on a computer motherboard.
- How to install computer memory (RAM)
- Buying tips on computer memory ( RAM) - choose right one before buying
- What type of computer RAM memory to use in a memory upgrade?
- What is a Memory Slot? A memory slot, memory socket, or RAM slot is what allows RAM (computer memory) to be inserted into the computer
- What is SDRAM (Synchronous DRAM)?
- What is DIMM (Dual In-line Memory Module)?
- What is SIMM (Single Inline Memory Module)?
- What is RAM (Random Access Memory)?
- What is DDR?
- What is DDR2 (Double Data Rate Two)?
Read_Only_Memory-ROM
- Flash memory - nand type memory - EPROM, EEPROM
- Programmable read-only memory - PROM - fuse/antifuse
- Read-only memory - ROM - solid state
- Write-only memory (engineering) - WOM - antithesis of read-only memory ROM - security, encryption - In computability theory, adding a WOM to some models of computation can increase their computational power - embedded, GPUs
- EPROM - (rarely EROM), or erasable programmable read-only memory, is a type of programmable read-only memory (PROM) chip that retains its data when its power supply is switched off - non volatile
- EEPROM - also E2PROM - stands for Electrically Erasable Programmable Read-Only Memory and is a type of non-volatile memory used in computers, integrated in microcontrollers for smart cards and remote keyless systems, and other electronic devices to store relatively small amounts of data but allowing individual bytes to be erased and reprogrammed - vs Flash memory for firmware - used for some security gadgets, such as credit card, SIM card, car key-less entry - Wikipedia
- NOR flash replacement - definitive advantages list of flash memory for embedded systems
- How is the original data written to a ROM chip? - Mask ROM, PROM, EPROM, EEPROM
- Primary Memory is RAM and ROM
- Random Access Memory (RAM) and Read Only Memory (ROM) - GeeksforGeeks
- Types of Primary Memory in Embedded Systems - RAM vs SRAM vs DRAM, Masked ROM, EEPROM vs Flash - Hybrids - definitive comparison table
Secondary_Storage-Hard_Memories
Storage_Technologies
- Samsung Outs Z-NAND's Performance; Intel's Optane On Notice
- What's the difference between ATA, PATA, and IDE? - Super User
- PCI IDE Controller - OSDev Wiki
- Cable Key - How IDE Controllers Work | HowStuffWorks
- What is IDE (Integrated Drive Electronics)? - Definition from WhatIs.com
- IDE vs SATA - Difference and Comparison - Connection interfaces to HDD - IDE= Parallel ATA = PATA
- What is the difference between volume and partition? - Quora
- HDD vs SSD - Difference and Comparison | Diffen
- Parallel ATA = PATA = Advanced Technology Attachment = IDE Integrated Drive Electronics | Interface standard for the connection of storage devices such as hard disk drives, floppy disk drives, and optical disc drives in computers - It uses the underlying AT Attachment ATA and AT Attachment Packet Interface (ATAPI) standards - - ATA Secure Erasure/deletion - Wikipedia
- How Hard Drive works: Firmware on Disk Platter and PCB - CMOS, BIOS, LBA Logical Block Addressing
- SCSI - Small Computer System Interface - set of standards for physically connecting and transferring data between computers and peripheral devices
- IDE/PATA vs. SCSI
- What is SATA (Serial AT Attachment)?
- Advantages of SATA over PATA/IDE
- Computer disk drive interface help and support - ATA, ATAPI, IDE/EIDE, floppy driv, RAID - motherboard
- What is RAID (Redundant Array of Independent Disks)?
- A floppy disk drive, also called FDD or FD for short, is a computer disk drive that enables a user to save data to removable diskettes.
- What is a Flash Drive? vs jump drive - SSD, memory cards, flash memory
- A hard disk drive (sometimes abbreviated as hard drive, HD, or HDD) is a non-volatile memory hardware device that permanently stores and retrieves data on a computer. A hard drive is a secondary storage device that consists of one or more platters to which data is written using a magnetic head, all inside of an air-sealed casing. Internal hard disks reside in a drive bay, connect to the motherboard using an ATA, SCSI, or SATA cable, and are powered by a connection to the PSU (power supply unit) - vs SSD
- What is an Optical Disc? Alternatively referred to as a disc drive, optical media, optical storage, Optical disc drive, and optical disk, an optical disc is any media read using a laser assembly. The most common types of optical media are Blu-ray, CDs, and DVDs.
- What is SSD (Solid-State Drive)? PCIe/SATA connection - flash memory - vs usb jump drive
- M.2 is a connection type specification for computer expansion cards, introduced in 2014. The two major types of M.2 devices are the SATA M.2 and the significantly faster (and more expensive) PCIe M.2
- Non-volatile memory/storage - NVM - secondary storage - Non-volatile data storage can be categorized into electrically addressed systems (read-only memory) and mechanically addressed systems (hard disks, optical disc, magnetic tape, holographic memory, and such) - ROM, flash, RAM - HDD - definitive breakdown
- NVM Express (NVMe) or Non-Volatile Memory Host Controller Interface Specification (NVMHCIS) is an open logical device interface specification for accessing non-volatile storage media attached via a PCI Express (PCIe) bus. The acronym NVM stands for non-volatile memory, which is often NAND flash memory that comes in several physical form factors, including solid-state drives (SSDs), PCI Express (PCIe) add-in cards, M.2 cards, and other forms. NVM Express, as a logical device interface, has been designed to capitalize on the low latency and internal parallelism of solid-state storage devices
- SATA 3 vs M.2 vs NVMe – SSD connections choice
- NVMe vs. M.2 vs. SATA – What’s the Difference? SSD - flash memory
- M.2 vs. SATA vs. PCIe (NVMe) SSDs: What’s the Difference? | Performance Computer - definitive breakdowns with pictures
- SATA vs. NVMe: Should You Upgrade Your SSD System Drive? performance
- Advantages of SSD over HDD - definitive comparison chart
- Do I need to defrag my SSD or flash drive? defragmentation - vs Hard Drive
- What is an Access Arm? Alternatively referred to as read/write head arm, head arm, or actuator arm, the access arm is in every mechanical hard drive
- What is a Memory Card? Types - CF (CompactFlash), MicroSD, MMC, SD Card, SDHC Card, SmartMedia Card, Sony Memory Stick, xD-Picture Card
- SCSI Vs. SATA Vs. IDE - definitive breakdown with
- What is SCSI (Small Computer System Interface)? pronounces scuzzy
- What is hard disk? - Definition from WhatIs.com
- Hard Disk and Hard Drive Physical Components
- HDD from inside: Hard Drive Main parts
- Difference between RAID 0, RAID 1, RAID 5 and RAID 10 - Coding Security
- Advertised vs. Actual Hard Drive Storage - discrepancy - free space mess than total capacity - decimal vs binary representation - file system formatting
- EEPROM - Wikipedia
- Non-volatile memory - Wikipedia
Disk_Partitioning
- Partition type - (or partition ID) in a partition's entry in the partition table inside a master boot record (MBR) is a byte value intended to specify the file system the partition contains and/or to flag special access methods used to access these partitions (f.e. special CHS mappings, LBA access, logical mapped geometries, special driver access, hidden partitions, secured or encrypted file systems, etc.).
- Master boot record - MBR - special type of boot sector at the very beginning of partitioned computer mass storage devices like fixed disks or removable drives intended for use with IBM PC-compatible systems and beyond
- Extended boot record (EBR), or extended partition boot record (EPBR), is a descriptor for a logical partition under the common DOS disk drive partitioning system
- GUID Partition Table - Wikipedia
- Disk partitioning - primary/extended/logical - GUID partition table, multi/mixed-boot systems - recovery - MBR - security benefit of partionning, setuid file disabling
- Partition - Debian Wiki
- Partitioning - MBR/GPT GUID Partition Table - bootstrap code
- DEFINITIVE - Preparing the disks - Gentoo Wiki - GPT vs MBR - fdisk, parted - btrfs RAID - LVM - partitioning scheme design guide - BIOS - creating filesystem
- Primary Partition VS. Logical Drive: Their Exact Features - MBR
- What is the difference between Primary and logical partition? - MBR, EBR
- hard drive - What are the differences between primary and logical partition? definitive visual explanation - MBR vs GPT - active partition
- Primary vs Logical partition - Unix & Linux Stack Exchange
- What is the Difference Between Primary/Extended Partition and Logical Drive?
- Ubuntu installation partitioning: Logical or primary? - Ask Ubuntu
- Primary Partition, Logical Partition and Extended Partition (Disk Partition Basic)
- What is a Logical Partition?
- What is a Partition?
- hard drive - Which is better for keeping data: primary partition or logical partition? - Super User
- Partition table - MBRGPT, APM, BSD disklabel - Wikipedia
- Partitioning - definitive - GPT vs MBR - partitionless - partionning tools fidsk, gpt fidsk, gnu parted garted,
- DEFINITIVE - An Easy Way to Set Partition as Active or Inactive with MiniTool - primary vs extended vs system vs boot partition
- What is the meaning of `SCSI3 (0,0,0)` in Partition disks during Ubuntu installation? - Ask Ubuntu - grub maintenance
- Boot flag - 1-byte value in a non-extended partition record, within a master boot record MBR. It appears at the beginning of a partition record, as the value 0x80. A value of 0x00 indicates the partition does not have the boot flag set - Active Partition
- 8.14. Installation Destination Red Hat Enterprise Linux 7 - recommanded paritionning scheme for linux
Bootable_Storage
- What is a Bootable Disk?
Physical_Address_Extension
- Physical Address Extension - PAE - NX bit
- Memory hierarchy - In computer architecture, the memory hierarchy separates computer storage into a hierarchy based on response time. Since response time, complexity, and capacity are related, the levels may also be distinguished by their performance and controlling technologies - CPU internal memory, registers/cache - main memory RAM, controller cards - online mass storage/secondary storage - offline bulk storage/tertiary storage
- What is the difference between a 'page' of memory and a 'frame' of memory? - Physical Memory vs Virtual Memory - Computer Science Stack Exchange
- Is-there-a-point-to-having-more-than-16gb-of-ram - Quora
- What is the relationship between CPU usage and RAM? - Super User
- virtual memory physical memory operating system at DuckDuckGo
- Is-8GB-of-DDR4-actually-better-than-16GB-of-DDR3 -- Quora
- Memory address - Wikipedia
- cache memory vs ram - Google Search
- Physical address - Wikipedia
- c - What resides in the different memory types of a microcontroller? - .text, .rodata, .data, .bss includes auto-zero-initialized data by compiler, EEPROM, Flash memory, ROM, and NVRAM- definitive breakdown - SPI or I2C bus - uninitialized static storage variables (static and file-scope globals) zero-initialization in .bss segment - Electrical Engineering Stack Exchange
- Difference Between Direct Access Memory DMA and Programmed Input/Output PIO
- How Memory Is Accessed by Processors - Virtual Addresses to Physical Address translation - Paging, Page number, Offset - L1, L2, L3 Caches , Buses, Memory Controllers - DDR, DRAM, DIMM
- Computer data storage - primary/secondary/tertiary/offline - volatility,mutability, random/sequential accessibility, addressability - performance, granularity - security - von neumann architecture - hierarchy storage
- What is Memory? RAM, ROM
Motherboard
- What is an Expansion Card? daughterboards - motherboards
- What is a PC Card ? PCMCIA
- How do I install an expansion card? Many types of expansion cards can be installed in a computer, including sound, video, modem, network, interface card, and others. In many cases, these expansion cards will fit in a slot in the computer called a PCI slot. However, in the case of video cards and a few others, they may fit into other types of slots, like an AGP slot or a PCI Express slot. Before purchasing and installing an expansion card, make sure you know which slots your computer has available on the motherboard
- What is an ExpressCard? replaces pc card
- What is an Expansion Slot? Alternatively referred to as a bus slot or expansion port, an expansion slot is a connection or port located inside a computer on the motherboard or riser card
- What is a Riser Board? A riser board is a circuit board that gives a computer motherboard the option for additional expansion cards to be added to the computer
- What is PCIe (PCI Express)? Originally known as 3rd Generation I/O (3GIO), PCI Express, or PCIe, was approved in July 2002 as a serial computer expansion bus standard. PCI Express was designed as a high-speed replacement for the aging PCI and AGP standards and is available in different formats.
- Expansion card - expansion board, adapter card or accessory card is a printed circuit board that can be inserted into an electrical connector, or expansion slot, on a computer motherboard, backplane or riser card to add functionality to a computer system via the expansion bus.
- What is an Adapter Card? An adapter card is any internal expansion card that allows the computer to communicate with another peripheral
- What is a Peripheral? Alternatively referred to as an auxiliary device, a peripheral is hardware input device or output device that gives a computer additional functionality. Peripheral devices, however, are not essential for the computer to perform its basic tasks; they can be thought of as an enhancement to the user's experience.
Screens
- what are touch screens made from - Google Search
Cooling_Systems
- Why do mobile phone processors not have cooling fans and laptop and PC processors require cooling fans? - Quora
Reparation-Maintainance
- Computer Starts then Shuts Down Immediately (1-2 Seconds) w/ Video - Systems
- My Computer shuts off a few seconds after i turn it on - TechSpot Forums
- Computer powers on and then immediately turns off
- computer case shuts down shortly after booty at DuckDuckGo
- Can I remove and put back the heatsink of my processor without reapplying thermal paste - Super User
- What should be the temperature of my computer processor?
- Is there a way to tell how hot my CPU is running?
- How to test computer memory to determine if it's bad
- How can I test for hardware failures in my computer?
- Can a heatsink really go bad? (Tech Support Forum)
- The Simplest Way to Monitor CPU Temperature - wikiHow
- How to Fix a Computer That Turns On and Then Off
- Why does my computer turn off without warning?
- What is a Thermal Compound?
Broken_HDD-Clicking_Noise
- How to fix a broken hard drive Beeping noise or clicking RECOVER GET DATA BACK FOR FREE! BEST TRICK - YouTube
- Fix Clicking Hard Drive And Recovery Data From Your Hard Drive - YouTube
- How to repair click sound on hard disk||How to repair click sound from hard drive|| - YouTube
- SOLVED: Any one know how to fix clicking noise? - Western Digital Essentials HD - iFixit
- How to Fix Clicking Hard Drive and Recover Data - EaseUS
- What To Do When Clicking Hard Disk Sounds Strike
- Why is my Hard Drive Clicking?
- Clicking Hard Drive Recovery Is Difficult? Absolutely No
- My Hard Drive is Clicking - Now What?
System_Time_Measurements-System_Clocks
- Epoch (computing) - Wikipedia
- System time - Wikipedia
- Unix time - Wikipedia
- How to convert epoch time to a date manually - Quora
Resources
- Computer Hope's Free Computer Help
- Packagecloud Blog - Posts and HOWTOs for Maven, RPM, DEB, PyPi and RubyGem users
- Buying a Pre-Built Gaming PC Is Now Smarter Than Building Your Own - ExtremeTech
- How to create a mainframe supercomputer - Quora
- mainframe vs super computer at DuckDuckGo
- super computer vs general purpose computer at DuckDuckGo
- main frame vs general purpose computer at DuckDuckGo
- Freestanding vs. hosted implementations | Embedded
- What is the difference between a hosted and a freestanding environment specifically in C language? - Quora
- programming languages - When machine code is generated from a program how does it translates to hardware level operations? microcodes - Stack Overflow
- Adapter (computing) - adapter card
Operating_Systems
Platforms
Comparisons
- Munich council: To hell with Linux, we're going full Windows in 2020 • The Register
- Keyboard Shortcuts Everyone Must Know
- Difference Between the macOS and Linux Kernels [Explained] | It's FOSS
- Robolinux Lets You Easily Run Linux and Windows Without Dual Booting | Linux.com | The source for Linux information
- Dartmouth Time Sharing System - operating system first developed at Dartmouth College between 1963 and 1964[1]. It was the first successful large-scale time-sharing system to be implemented, and was also the system for which the BASIC language was developed. DTSS was developed continually over the next decade, reimplemented on several generations of computers, and finally shut down in 1999 - PDP-1
UNIX-like
GNU-Linux
Linux_From_Scratch
- Welcome to Linux From Scratch!
- Linux From Scratch - LSF
- Linux from Scratch teaches building blocks | Opensource.com
Kernel
- dmesg command at DuckDuckGo
Kernel_Programming
Building_Kernel_Modules_and_Drivers
- Exploring the Linux kernel: The secrets of Kconfig/kbuild | Opensource.com
- https://www.kernel.org/doc/Documentation/kbuild/modules.txt
- https://www.kernel.org/doc/Documentation/kbuild/makefiles.txt
- What is the functional difference between kbuild and normal makefile? - Quora
Setting_Up_Environment
- How to install Linux Kernel Headers on Kali Linux 2.0 (Kali Sana) - Computingforgeeks
- 14.04 - Do I "need" DKMS? - Ask Ubuntu
- Dynamic Kernel Module Support - Wikipedia
- What does DKMS do? How do I use it? - Ask Ubuntu
- Dynamic Kernel Module Support - DKMS - ArchWiki
- Kernel Korner - Exploring Dynamic Kernel Module Support (DKMS)
- Pros and Cons of Using DKMS
- Add kernel modules with DKMS | Clear Linux* Project
- kernel - How do I install the virtualbox-dkms package? - Ask Ubuntu
Refs
- LXR / The Linux Cross Reference
- Embedded Linux, kernel, drivers, real-time, Yocto and Buildroot training
- linux - How to learn kernel programming from the start? - Unix & Linux Stack Exchange
- linux - Kernel Hacking Environment - Unix & Linux Stack Exchange
- linux - Learning Kernel Programming - Stack Overflow
- drivers - Best way to get into Kernel programming? - Unix & Linux Stack Exchange
- Understanding the Linux Kernel, 3rd Edition - O'Reilly Media
- Linux_Kernel_Newbies - Kernel Programming/Hacking - Linux Kernel Newbies
- LKML.ORG - the Linux Kernel Mailing List Archive
- Kernel Hacking Guides — The Linux Kernel documentation
- The Linux Kernel official documentation — The Linux Kernel documentation
- modprobe - Wikipedia
- udev - Wikipedia
- unix kernel hacking - Google Search
- 4 paths to being a kernel hacker - Julia Evans
- The Linux Kernel Module Programming Guide
- LKMPG/LKMPG-4.15.2.org at master · bashrc/LKMPG · GitHub
- Linux Device Drivers, Third Edition [LWN.net]
- Easy Intro to Linux Kernel Programming - YouTube
- Manuel Schölling: Linux Kernel Development for Newbies - YouTube
- Loadable kernel module = LKM
- GitHub - gurugio/book_linuxkernel_blockdrv
- GitHub - gurugio/linuxdeveloptip
- GitHub - gurugio/caos: Calcium OS project for x86_64
- GitHub - infoslack/awesome-unikernels: A list about Unikernels
- Linux Kernel Hacking Free Course
- What does __init mean in the Linux kernel code? - Stack Overflow
- Unit Testing in the Linux Kernel | Linux Journal
- What's the relationship between a Linux OS and a kernel? - Stack Overflow
- What is the difference between the operating system and the kernel? - Stack Overflow
- What is an OS kernel ? How does it differ from an operating system? - Stack Overflow
- Linux Kernel Driver Programming with Embedded Devices | Udemy
- how to develop USB kernel module at DuckDuckGo
- Linux kernel - Wikipedia
- Linux Kernel: How does copy_to_user work? <asm/uaccess.h>
- What happens once a system call is made by a process in user space? - definitive step by step explanation - glibc wrapper function - kernel trap handler
- What is the difference between user space and the kernel space? - definitive visual explanation, diagram
- c - System call vs Function call - interrupt - kernel code - lic C library wrappers
- Adding a New System Call — alternatives - API design - x86 - definitive
- Linux Assembly HOWTO - usage example make system call without using libc , bypass libc
- DEFINITIVE - How to access the system call from user-space? bypass libc to make system call - CPU mode, ring - vdso - SYSCALL macro, assembly code example
- linux - What is better "int 0x80" or "syscall"? - Stack Overflow
- system call - assembly - What happens if you use the 32-bit int 0x80 Linux ABI in 64-bit code? - definitive - peter cordes answer
- How does System Call return data back to user space in Linux Kernel? - Quora
- How the kernel differentiate between kernel virtual address (logical address) and user space virtual address in 1GiB/3GiB split in protected mode? Because in the process context, If kernel want to access the user space address, it should be mapped. Isn't it? high/low memory
- What will happen if user processes could directly interact with I/O devices without using the kernel? - baremetal
- What is the difference between user-space and kernel-space device drivers in Linux? - Quora
- When a process makes a system call, how does the OS know which process made the call? - scheduler
- Kernel System Calls - definitive visual explanation, source code samples
- Anatomy of a system call, part 1 [LWN.net]
- Linux Tutorial: How a Linux System Call Works - YouTube
- Sysenter Based System Call Mechanism in Linux 2.6
- Memory Management APIs — The Linux Kernel documentation - kmalloc
- KGDB - kernel debugging
Input_Handling
- Exploring /dev/input | struct input_event - with python code examples
- events - How can I know which of the /dev/input/eventX (X=0..7) have the Linux input stream? - /proc/bus/input/devices
- linux - /dev/input - What exactly is this? - Unix & Linux Stack Exchange
- Declare Variables At First Use - coding style - placement, top of scope
- Writing Portable Device Drivers | __u8, __u16, __u32, __u64, __s8, __s16, __s32, __s64
- c - why is u8 u16 u32 u64 used instead of unsigned int in kernel programming - kernel programming, device driver - __u8, __u16, __u32, __u64 vs uint8_t etc
- GPM (software) - General Purpose Mouse - ncurses, evdev, input module
- https://www.kernel.org/doc/Documentation/input/input.txt - struct input_event - /dev/input/eventX - select() system call - evdev - input, mousedev, keybdev, usbcore, uhci_hcd, ohci_hcd, ehci_hcd, usbhid - event handlers, GPM general purpose mouse
- 1. Creating an input device driver — The Linux Kernel 4.14.0+ documentation
- c - Accessing Keys from Linux Input Device - struct input_event, time, type, code, value - press/release - definitive example -
- Linux Driver Tutorial: How to Write a Simple Linux Device Driver
- Linux Inside - definitive book - Linux kernel programming, internals, bootloader, interrupt handlers, systems calls, timers, time management, clocksource, multithreading, synchronization primitives, mutex, semaphores, spinlock, seqlock, rcu, lockdep - memory managment, memblock, fixmap, ioremap, memblock, kmemcheck - data structures, doubly linked list, radix tree, bit arrays - paging, elf64n assembly, CPUID, pmsr - initial ramdisk initrd - linkers/linking process - userspace
- Conceptual Architecture of the Linux Kernel - 2. System Architecture 2.1 System Overview 2.2 Purpose of the Kernel 2.3 Overview of the Kernel Structure 2.4 Supporting Multiple Developers 2.5 System Data Structures 3. Subsystem Architectures 3.1 Process Scheduler Architecture 3.2 Memory Manager Architecture 3.3 Virtual File System Architecture 3.4 Network Interface Architecture 3.5 Inter-Process Communication Architecture - VFS - IPC
- rhel - What is a subsystem (for example, the netfilter subsystem)? - Unix & Linux Stack Exchange
- Anatomy of the Linux kernel – subsystems - memory, process management
- Linux Kernel For Newbies – Tutorials that anyone can understand !!
- arm - Why Device Tree Structure (DTS) file is needed both in bootloader and kernel source code? U-Boot
- Introduction to Device Trees - flattened FDT - dtb, dts - U-Boot
- /dev/kmsg - kernel printk buffer
- linux - what is the difference between /proc/kmsg and dmsg? - Stack Overflow
- kmsg: export printk records to the /dev/kmsg interface [LWN.net]
- menuconfig - make - linux kernel source compilation
- Does an application purely for intranet use by employees need secure software design or to follow OWASP guidelines? - secure coding/design - abuse / misuse - definitive - defense in depth
- history - Why is there a Linux kernel policy to never break user space? - BCP
- Driving Me Nuts - Things You Never Should Do in the Kernel | BCP
- Linux kernel coding style
- Microkernel vs Monolithic - YouTube
- How does Linux kernel compare to microkernel architectures? - Unix & Linux Stack Exchange
- Kernel panic - to avoid security breaches/risks
- Linux just got one of its biggest kernel updates yet says Linus Torvalds | ZDNet
- Linux Kernel 4.12 Released with BFQ, USB Type-C Manager, Much More - OMG! Ubuntu!
- With Linux, You Don't Get One Kernel of Truth... You Get Many | Software | LinuxInsider
- A beginner's guide to Linux syscalls | Opensource.com
- hybrid kernel vs monolithic kernel - Google Search
- Hybrid kernel - Wikipedia
- The Linux Kernel - Hardware Basics, Software Basics, Memory Management, Processes, Interprocess Communication Mechanisms, PCI, Interrupts and Interrupt Handling, Device Drivers, The File System, Networks, Kernel Mechanisms, Modules, Processors, The Linux Kernel Sources, Linux Data Structures, Useful Web and FTP Sites - definitive ebook
Device_Trees
- Device Tree for Dummies - definitive introduction - ardware description language - compilation - kernel uImage, zImage - boot loader - ATAGS, r1/r2 register - Device Tree Blob TDB - Power.org Standard for Embedded PowerArchitecture Platform Requirements (ePAPR) - Basic Device Tree syntax - Device Tree Sourcefiles (DTS), arch/arm/boot/dts, .dtsi files - Device Tree Compiler scripts/dtc - arch/arm/boot/dts/Makefile - driver side - Kernel ABI
- Device tree - Blob DTB - boot loaders - x86 based computers generally do not use device tree - used by kernel - static device tree stored in ROM - Device tree generation in early stages of booting process
- DeviceTree - official Device Tree Specification Standard Comitee
- Devicetree Specification · devicetree.org
- Device Tree What It Is - Flattened Device Tree
- Device Tree Reference - Device Tree Source Format
- Device Tree Mysteries - eLinux.org
- DEFINITIVE Intro to Reverse Engineering - hardware/firmware hacking/reversing - security - Tools I2C, SPI, asynchronous serial, UART, CAN, dd, binwalk, objcopy, objdump, readelf, strace, ltrace command - DTB Device Tree Blobs - JTAG/SWD, read the firmware out of the boot flash - Opening the Manufacturer Case, epoxy, potting the device, anti-tamper switches bypassing -- Embedded Linux Conference, Open IoT Summit
- Device tree - stm32mpu - dts, dtsi, dtb, dtc - linux kernel, u-boot, TF-A, dt - Tools fdtdump, fdtget, dtput
- Linux and the Device - The Linux usage model for device tree data - kernel doc
- Device Trees, overlays, and parameters - DTS syntax, dtb - loader start.elf - Device Tree parameters - dynamic device tree - debugging - dtoverlay, dtparam, dtc, dtmerge, dtdiff commands, config.txt
- Build Device Tree Blob DTB - Xilinx Wiki - Confluence
- kexec = kernel execution - hotpatching/live patching - security, kernel modules signature - Only signed kernel can be booted through kexec call - UEFI secure boot
- kdump (Linux) - kexec - kernel crash dumps - /proc/vmcore
- Raw device - 0_DIRECT flag
Linux_System_Calls
- ptrace - process trace - system call used by debuggers and code analysis tools - security /proc/sys/kernel/yama/ptrace_scope - Wikipedia
- kill - system call and command wrapper - Wikipedia
- exit (system call) - Wikipedia
- open (system call) - Wikipedia
- read (system call) - POSIX
- write (system call) - Wikipedia - file descriptor
- close (system call) - Wikipedia
- wait (system call) - Wikipedia
- exec (system call) - execl, execle, execlp, execv, execve, execvp - overlay = "recouvrement"
- Fork (system call) - vfork(), rfork(), clone() system calls
- DEFINITIVE - How can I find the implementations of Linux kernel system calls? userspace, kernel space - open() overload varargs - mkdir - VFS filesystem abstraction used by kernel - ext4_mkdir() - mmap memory management subsystem
- linux - exec() and system() system calls - system() fork-exec()s a new shell in which the command is processed
- Difference between slow system calls and fast system calls - Unix & Linux Stack Exchange
- DEFINITIVE - API with no system calls - definitive simple explanation of system calls - process isolation/memory protection, MMU - kernel privileged/unprivileged mode - CPU architecture - answer of Gilles - strace, truss
- kernel - What are unimplemented system calls? afs_syscall
- If the kernel can sleep when handling a system call, how does execution return to the system call ? explanation of a robert love sentence
Shell
Terminal
- Install terminology - A terminal with fancy Features
Shell_Scripting
- What is the difference between Shell scripting and Bash Shell scripting? - Quora
- Difference between single and double quotes in Bash - Stack Overflow
- shell - What is the difference between the Bash operators [[ vs [ vs ( vs ((? - Unix & Linux Stack Exchange
- bash - Why does parameter expansion with spaces without quotes work inside double brackets "[[" but not inside single brackets "["? - Unix & Linux Stack Exchange
- linux - Difference between ${} and $() in Bash - Stack Overflow
- command line - Difference between " " and ' ' in bash - Ask Ubuntu
- linux - What is the difference between &> and >& in bash? - Super User
- What's the difference between [ and [[ in Bash? - Stack Overflow
- shell - What is the "eval" command in bash? - Unix & Linux Stack Exchange
- shell - What is the difference between sourcing ('.' or 'source') and executing a file in bash? - Unix & Linux Stack Exchange
- alias vs. function in bash scripts - Ask Ubuntu
- In Bash, when to alias, when to script, and when to write a function? - Unix & Linux Stack Exchange
- bash - Aliases vs functions vs scripts - Unix & Linux Stack Exchange
- shell - How to pass parameters to an alias? - Unix & Linux Stack Exchange
- shell - What is the difference between alias and export (and a function!)[BASH]? - Stack Overflow
Shell_History
- maximum size bash history file at DuckDuckGo
- histsize vs histsizefile at DuckDuckGo
- unix - bash HISTSIZE vs. HISTFILESIZE? - Stack Overflow
- Is there a maximum size to the bash history file? - Unix & Linux Stack Exchange
- BashFAQ/088 - Greg's Wiki
- Bash eternal history
- linux - How to: Unlimited Bash/shell history? - Super User
Command_Line_Cheats
- 8 creepy commands that haunt the terminal | Opensource.com
Dangerous_Commands
- List of dangerous shell commands
- 5 Deadly Linux Commands You Should Never Use
- My 10 Linux and UNIX Command Line Mistakes - nixCraft
- Become a Command Line Ninja With These Time-Saving Shortcuts
- 20 Linux commands every sysadmin should know | Opensource.com
- Most useful BASH commands to master - Scripting/Programming - nixCraft Linux/Unix Forum
Dealing_With_The_Manual
- TLDR pages
- TLDR is what Linux man pages always should have been
- How to View Colored Man Pages in Linux
Parsing_Datas-Globbing_Regexps
- Regular expression - Wikipedia
- sed - vs ed - Wikipedia
- linux - how to extract line portion on the basis of start substring and end substring using sed or awk - Stack Overflow
- Black Magic Parsing with Regular Expressions (Parsing for Pentesters: Post 2) | Pentest Armoury
- Regular Expressions - sed, a stream editor
- Regular Expression Library
- Regular Expression Pocket Reference, 2nd Edition - O'Reilly Media
- Expresso Regular Expression Tool
- RegexBuddy: Learn, Create, Understand, Test, Use and Save Regular Expression
- Unix / Linux Regular Expressions with SED
- Regular-Expressions.info - Regex Tutorial, Examples and Reference - Regexp Patterns
- How to master Regular Expressions? - Stack Overflow
- How to use regular expression in sed command - Stack Overflow
- The Regex Coach - interactive regular expressions
- sed regular expression at DuckDuckGo
- RegexPlanet: online regular expression testing for Java
- Finding Diamonds in the Rough: Parsing for Pentesters: Post 1 | Pentest Armoury
- F’Awk Yeah! Advanced sed and awk Usage (Parsing for Pentesters 3) | Pentest Armoury
- stackoverflow.com/questions/1632113/what-is-the-difference-between-sed-and-awk
- Regex tutorial for Linux (Sed & AWK) examples - Like Geeks
- Kleene star - regular expression
- globbing - how to handle bash * matching when there are no matches? - shopt -s nullglob
- How does a shell (bash, for example) expand wildcard patterns? - globbing
- shell - find(1): how is the star wildcard implemented for it to fail on some filenames? - Unix & Linux Stack Exchange
- c - implementing globbing in a shell prototype - Stack Overflow
- Bash Extended Globbing | Linux Journal
- glob (programming) - vs regular expressions - globbing vs regexp
- GitHub - begin/globbing: Introduction to "globbing" or glob matching, a programming concept that allows "filepath expansion" and matching using wildcards.
- linux - Using a glob expression passed as a bash script argument - Stack Overflow
- research!rsc: Glob Matching Can Be Simple And Fast Too
- globs vs regexps [LWN.net]
- grep - How do regular expressions differ from wildcards used to filter files - globbing
- Globbing in Bash - vs regexp - sed, awk
- Wildcards - globbing, regexps
- Regular Expressions and shell globs
- regex - What are the differences between glob-style pattern and regular expression? - Stack Overflow
- files - Regular expressions VS Filename globbing - Ask Ubuntu
- Globbing and Regex: So Similar, So Different | Linux Journal
- What's the meaning of a dot before a command in shell? - Unix & Linux Stack Exchange
- Source vs . why different behaviour? - Unix & Linux Stack Exchange
- What does 'source' do? - Super User
- source vs dot linux at DuckDuckGo
- What is the difference between using `sh` and `source`? - Stack Overflow
- bash shell: 'exec', 'eval', 'source' - definitive breakdown
- What's the difference between eval and exec? - Unix & Linux Stack Exchange
- Alacritty - A Fastest Terminal Emulator for Linux
- console vs terminal at DuckDuckGo
- shell - Difference between nohup, disown and & - Unix & Linux Stack Exchange
- command is hashed meaning unix - Google Search
- how to implement autocompletion for linux shell script - Google Search
- A minimalist guide to tmux – Peter Jang – Medium
- Search For - A bash function that harnesses the power of fzf and rg to let you edit as quickly as possible
- How to Download and Extract Tar Files with One Command
- How To Check Bitcoin And Other Cryptocurrency Prices From Linux Terminal?
- How To Use Bash Parameter Substitution Like A Pro - nixCraft
- How to use dd in Linux without destroying your disk | Opensource.com
- linux - What's the difference between nohup and ampersand - Stack Overflow
- Copy Shell Prompt Output To Linux / UNIX X Clipboard Directly - nixCraft
- Where is the clipboard file located? - Unix & Linux Stack Exchange
- 30 Handy Bash Shell Aliases For Linux / Unix / Mac OS X - nixCraft
- linux - Move all files except one - Stack Overflow
- Setting an environment variable before a command in bash not working for second command in a pipe - Stack Overflow
- In RHEL/CentOS 7, does mv actually do a cp & rm on the same filesystem? - system calls
- filesystem - How does linux handle a move command - internally
- mv command - linux
- file - How "rm" command in Linux works? - internally - strace -
- Remove files with names containing strange characters such as spaces, semicolons, and backslashes in Unix - rm command
- shell - How do I delete a file whose name begins with "-" (hyphen a.k.a. dash or minus)? - rm command
- Perform Multiple Operations in Linux with the 'xargs' Command - Make Tech Easier
- The Unix Shell: Finding Things - How can I find files? How can I find things in files? - Use grep command to select lines from text files that match simple patterns - Use find command to find files whose names match simple patterns.
- Use the Unix find command to search for files
- How do I master the UNIX find command? - Server Fault
- Mastering file searches on Linux | find
- find command (Unix) - Wikipedia
- bash - cp command to exclude certain files from being copied - rsync
- bash - Copy folder recursively, excluding some folders - rsync
- linux - How to use 'cp' command to exclude a specific directory? - rsync
- Which are (bash) shell special parameters? - definitive - $*, $@, $#, $?, $-, $$, $!, $0, $_
- bash - How to exclude a folder when using the mv command - Ask Ubuntu
- Understanding ls output - Stack Overflow
- bash - When do we need curly braces around shell variables? brace/variable expansion - dollar
- bash - Explanation of colon operator in ": ${foo=value}" - Stack Overflow
- What does ":" (colon) operator in a bash variable expansion: VAR=${TEMP:3}? ${var:pos:len} means that the variable var is expanded, starting from offset pos with length len - not in POSIX shells, only bash and ksh
- Parameter expansion [Bash Hackers Wiki] - substring removal - definitive
- command line - Why does `type which` say that `which is hashed`? bash, shell -
- bash - How to loop through a directory recursively to delete files with certain extensions - bash for
- Bash Parameter Expansion | Linux Journal
- An introduction to parameter expansion in Bash | definitive
- grep - globally search a regular expression and print - unix command - PDP 11 assembly
- ed (Unix interactive text editor) - VS sed stream editor Wikipedia
Linux_Boot_Process-Firmwares
- LinuxBoot for Servers: Enter Open Source, Goodbye Proprietary UEFI | It's FOSS
- An introduction to the Linux boot and startup processes | Opensource.com
- Lesson. 0: Understanding the RISC-V Ecosystem & Booting Your First Kernel – So, you want to write an Operating System in Rust?
- LinuxBoot
- LILO (boot loader) -LILO (Linux Loader) is a boot loader for Linux and was the default boot loader for most Linux distributions in the years after the popularity of loadlin. Today, many distributions use GRUB as the default boot loader, but LILO and its variant ELILO are still in wide use. Further development of LILO was discontinued in December 2015 - grub
- SYSLINUX - isolinux, pxelinux, extlinux
- Syslinux is a collection of boot loaders capable of booting from drives, CDs, and over the network via PXE. Some of the supported file systems are FAT, ext2, ext3, ext4, and uncompressed single-device Btrfs.
- What is the difference between SYSLINUX and GRUB? - Quora
- grub2 - What is the difference between GRUB and SYSLINUX? - Ask Ubuntu
- How to View, Modify and Recreate initrd.img
- linux - how to add application to initrd.gz - Unix & Linux Stack Exchange
- 5.1. Booting the Installer on 64-bit PC - lilo, grub, loadlin
- Linux initial RAM disk (initrd) overview – IBM Developer
- Initial ramdisk - initrd - boot process - vs initramfs
- Using the initial RAM disk (initrd) — The Linux Kernel documentation
- linux - What is vmlinuz and why do I care? - kernel replacement attack
- boot - Is vmlinuz and bzImage really the same? kernel images
- Anatomy of the initrd and vmlinuz (Open Diary – Munshi Hafizul Haque (SazaL))
- kernel - Can i remove /initrd.img and /vmlinuz in root? - grub.cfg
- vmlinux - On Linux systems, vmlinux is a statically linked executable file that contains the Linux kernel in one of the object file formats supported by Linux, which includes ELF, COFF and a.out. The vmlinux file might be required for kernel debugging, symbol table generation or other operations, but must be made bootable before being used as an operating system kernel by adding a multiboot header, bootsector and setup routines - bzImage - Gentoo
- System.map - In Linux, the System.map file is a symbol table used by the kernel. A symbol table is a look-up between symbol names and their addresses in memory. A symbol name may be the name of a variable or the name of a function. The System.map is required when the address of a symbol name, or the symbol name of an address, is needed. It is especially useful for debugging kernel panics and kernel oopses. The kernel does the address-to-name translation itself when CONFIG_KALLSYMS is enabled so that tools like ksymoops are not required
- Booting ARM Linux - definitive kernel doc break down
- Linux startup process - initrd, intramfs - bootloaders GRUB, LILO, SYSLINUX or Loadlin - init systems systemd, upstart
- Dual boot with Windows - ArchWiki
- What is the difference between GRUB and the Windows bootloader? - Quora
- DEFINITIVE - Analyzing the Linux boot process | device tree, dtb - initrd intialramdisk
Filesystem
Files_Permissions
- setuid - security issues if process is vulnerable to e.g buffer overflow - Wikipedia
- CS360 Lecture notes -- The Setuid bit, passwd, time
- Sticky bit - Wikipedia
- User identifier - euid/Effective User Identifier, suid/Saved User Identifier, ruid/Real User Identifier - Wikipedia
- umask - Wikipedia
- Group identifier - Wikipedia
- Process identifier - Wikipedia
- chmod - Wikipedia
- File system permissions - setuid, setgid, and sticky bits - s, S, t - Wikipedia
- Privilege revocation (computing) - Wikipedia
- Privilege separation
- setuid permissions at DuckDuckGo
- cis.rit.edu/class/simg211/unixintro/Access_Permissions.html
- sudo - substitute user do - unix command- Wikipedia
- sudoer file unix site:cyberciti.biz - Google Search
- What is SUID and how to set SUID in Linux/Unix? - The Linux Juggernaut
- 10 Useful Sudoers Configurations for Setting 'sudo' in Linux
- Take Control of your Linux | sudoers file: How to with Examples
- Superuser - Wikipedia
- su (Unix) - Wikipedia
- RootSudo - root password not set in ubuntu - root account locked - sudo vs su security scheme - sudo -i vs sudo su - vs sudo -s vs sudo su - definitive breakdown - Reset sudo timeout - Downsides of using sudo - graphical sudo - add user - Enable/Disable your root account - bootloader, privilege escalation, malicious init replacement - sudoers
- Fix Broken Sudo - /etc/sudoers
Filesystem_Hierarchy_Standard
- Filesystem Hierarchy Standard
- Why are Linux programs spread across the filesystem when they are installed?
- Filesystem Hierarchy Standard
- Filesystem Hierarchy Standard - Wikipedia
- Operating System | Unix File System - GeeksforGeeks
- An Overview of the Unix Filesystem - Understanding the Linux Kernel, Second Edition [Book]
- /root is the root user's home directory
- directory structure - What is this folder /run/user/1000? - Unix & Linux Stack Exchange
- Linux directory structure: /lib explained - The Linux Juggernaut
Architecture-Inodes_and_links
- Symbolic link - Wikipedia
- Hard link - directories - across file system, volumes
- Ln (Unix) - Wikipedia
- symbolic links linux at DuckDuckGo
- Create a symbolic link in Unix
- What is a hard and symbolic (soft) link in Linux or Unix? - nixCraft
- What is the difference between a hard link and a symbolic link? - Ask Ubuntu
- What is the difference between a hard link and a symbolic link?
- unix - What is the difference between a symbolic link and a hard link? - Stack Overflow
- DEFINITIVE - Is the file table in the filesystem or in memory? inode tables : in-memory/on-disk, open file table per process, data block - fseek - file descriptor - st_nlink, st_ctime - stdin, stdout, stderr - device file tty - modprobe
- Why isn't it possible to create hard links across file system boundaries? - nixCraft
- rhel - What's the difference between a hard links and copied files? - Unix & Linux Stack Exchange
- hard link - Is there a difference between hardlinking with cp -l or ln? - Unix & Linux Stack Exchange
- inode - vs vnode in BSD systems
- Chapter 3: UNIX File System Basics - inodes - definitive guide - superblock
- The File system - ext2 - virtual file system - definitive - inodes - superblocks
- linux - How are directory structures stored in UNIX filesystem? - inodes - superblock
- Where are filenames stored on a filesystem? - Directory's structure - filename/inode number pairs - Unix & Linux Stack Exchange
- Why are hard links to directories not allowed in UNIX/Linux? - directory vs file vs inode - Unix & Linux Stack Exchange
- Understanding Virtual Nodes (V-nodes) - vs inodes
- operating system - Inode vs Vnode Difference - Stack Overflow
- The Kernel File System Tables | The HP-UX Kernel: Basic Organization - virtual file system - inode cache - buffer cache
- How to tell which file is original if hard link is created - hardlink vs filename - definitive
- linux - How can you see the actual hard link by ls? - Super User
- The number of hard links in ‘ls -l’ - directory - definitive
- ls - Why does a new directory have a hard link count of 2 before anything is added to it? - Unix & Linux Stack Exchange
- filesystems - Why are hard links to directories not allowed in UNIX/Linux? definitive break down - inode, file vs file names vs directory - file system directed acyclic graph structure - du command - loops
- filesystem - Why are hard links not allowed for directories? readlink, loops - definitive - copy on write cow
- DEFINITIVE - Understanding Hard and Soft Links on Linux – file system layers - storage design - definitive visual explanation - fragmentation, fragmented files - inodes - filenames - dangling symbolic link - copy vs hard link
- Soft and Hard links in Unix/Linux - GeeksforGeeks
- Why are hard links only valid within the same filesystem? - across/span filesystems, volumes, partitions - hard link vs soft link - definitive answers
- Hard Link and Symbolic Link?? - megha mohan - Medium
- DEFINITIVE - ln -s vs mount --bind - hard link vs soft link filesystems/partition/volume span/crossing definitive explanation - across filesystems
- Meaning of "b" and "c" in file privileges description (output of ls -l) - Ask Ubuntu
- ls -l explained
- Linux Standard Base - LSB - Linux ABI - Wikipedia
- clearing orphaned inode linux at DuckDuckGo
- opensource.com/article/17/6/linking-linux-filesystem?sc_cid=70160000001273HAAQ
- An introduction to Linux's EXT4 filesystem | Opensource.com
- Managing devices in Linux | Opensource.com
- A high-level discussion of Linux filesystem concepts | Opensource.com
- A Linux user's guide to Logical Volume Management | Opensource.com
- Everything is a file | Opensource.com
- linux file descriptor tutorial - Google Search
- Understanding Linux filesystems: ext4 and beyond | Opensource.com
- How does Linux identify file types without extensions? And why can't Windows do so? - Quora
- macos - What's the difference between ln -s and alias? - Stack Overflow
- Unix low-level file operations
- UNIX File System
- Unix filesystem - Wikipedia
- Unix file types - Wikipedia
- filesystem name space
- Everything is a file - Wikipedia
- Why is everything on Linux or Unix a file? I need a detailed explanation. - Quora
- Difference between cp -r and cp -a - Unix & Linux Stack Exchange
- command line - How can I copy a file to a new location, creating the directory as well - Ask Ubuntu
- fstab - Wikipedia
Metadata
- file metadata unix at DuckDuckGo
- filesystems - What is metadata, and how does it aid in the "fsck" process? - Unix & Linux Stack Exchange
- linux metadata - pdf Columbia University
- linux - What is .Trash and .Trash-1000? - Super User
- Virtual file system - VFS - Virtual Filesystem Switch - specifies an interface (or a "contract") between the kernel and a concrete file system - Wikipedia
- Linux File System and Kernel Version Explained
- How to format a usb drive with FAT32 file system on Linux
Init_Systems
- 5 Best Modern Linux 'init' Systems (1992-2015)
- systemctl vs service vs initctl at DuckDuckGo
Resources_Administration
- cpu architecture - Is there a system command, in Linux, that reports the endianness? - Unix & Linux Stack Exchange
- central processing unit - How to tell if a Linux system is big endian or little endian? - Server Fault
- lsb_release vs uname at DuckDuckGo
- uname - Unix name command - Wikipedia
- Echoes: 'uname -a' Explained
- unix - explain uname -a command on linux? How to find vender's name of OS? - Stack Overflow
- Linux Commands — uname with examples - abclearn - Medium
Inter-Process_Communication-Input_Output
- dbus vs socket at DuckDuckGo
- dmesg vs dbus at DuckDuckGo
- dbus
- Unix: confusing use of the Tee -command - Stack Overflow
- shell - Difference between 2>&1 > output.log and 2>&1 | tee output.log - Unix & Linux Stack Exchange
- tee (command) - T splitter redirection functionnalities - Wikipedia
- bash - What does "< <(cmd args)" mean in the shell? - Stack Overflow
- command line - What's the difference between <<, <<< and < < in bash? - <() - Ask Ubuntu
- command line - "/dev/fd/63 No such file or directory" - Ask Ubuntu
- bash - Why is there a "/dev/fd/63" in the output of "echo 123 >(cat)"? - Unix & Linux Stack Exchange
- linux - What exactly is <() in bash (and =() in zsh)? - process substitution - Super User
- Inter-process communication - IPC - Different Approaches - Synchronization - definitive comparative table - monolithitic vs micro/nano kernel - file, signal/asynchronous system trap, socket vs unix domain socket, message queue, anonymous pipe, named pipe, shared memory, mesage passing, memoy-mapped file
- Local Inter-Process Communication LPC - Local Procedure Call or Lightweight Procedure Call - internal, undocumented inter-process communication facility provided by the Microsoft Windows NT kernel for lightweight IPC between processes on the same computer. As of Windows Vista, LPC has been rewritten as Asynchronous Local Inter-Process Communication (ALPC, often also Advanced Local Procedure Call) in order to provide a high-speed scalable communication mechanism required to efficiently implement User-Mode Driver Framework
- Shared memory - Interprocess communication - Wikipedia
- Process substitution - form of IPC inter-process communication - Wikipedia
- Unix domain socket - IPC Inter-Process Communicaton Socket - Wikipedia
- Comparing Unix/Linux IPC - comparison
- D-Bus = Desktop Bus - software bus, an inter-process communication (IPC), and a remote procedure call (RPC) mechanism that allows communication between multiple computer programs (that is, processes) concurrently running on the same machine - libdbus
- D-Bus - broker , libdbus
- D-Bus - USE flags
- What is the underlying transport for D-Bus?
- D-Bus Tutorial - official doc
- D-Bus Specification - official doc
- what dbus performance issue could prevent it from embedded system? - IoT
- Which Linux IPC technique to use? comparison
- D-Bus optimizations – Rodrigo Moya
- D-Bus optimizations II – Rodrigo Moya
- D-Bus FAQ - official doc
- About performance of D-Bus
- Speeding up D-Bus
- D-Bus Broker Announced As A New, High Performance Message Bus - Phoronix
- The Slothful Ways of D-Bus - will-thompson-dbus-performance.pdf
- Asynchronous System Trap - signals - re-entrant
- dbus at DuckDuckGo
- dbus protocol security aspects - Google Search
Job_Scheduling
- How To Schedule Jobs in Linux | Cron and Crontab Commands
- How to use cron in Linux | Opensource.com
- Scheduling Tasks with Cron Jobs
- Process Schedulers in Operating System - GeeksforGeeks
- Scheduling (computing) - Wikipedia
Disks_Management
- command line - How to create a bootable Ubuntu USB flash drive from terminal? - Ask Ubuntu
- boot - How to create a bootable USB with multiple ISO images in it - Ask Ubuntu
- dd (Unix command) - Data Definition
- filesystems - How should I format a USB prior to writing an ISO to it?
- Linux dd command explained for beginners (8 examples)
- partitioning - Do you need to format a flash drive before dd an image to it? - Super User
- usb creator - How can I create a Windows bootable USB stick using Ubuntu? - Ask Ubuntu
- How to burn a Windows .iso to a USB device? - Ask Ubuntu
- Create A Bootable Windows 7 USB Drive From Linux (Tested On Ubuntu) - unetbootin
- Create a Bootable Windows 7 or 10 USB Drive in Linux
- Create a Bootable Windows 10 USB in Linux With Ubuntu/Debian GUI - nixCraft
Configuration_Systems
- dconf at DuckDuckGo
- equivalent of registry on linux at DuckDuckGo
- Linux equivalent of Windows Registry - Super User
- terminal - What is the Linux equivalent of the Windows registry? - Unix & Linux Stack Exchange
Search_Tools
- The best Linux desktop search tools | TuxRadar Linux
- linux search tool content - Google Search
- linux - How to search contents of multiple pdf files? - Stack Overflow
- linux - What are alternative tools for searching files in full content? - Unix & Linux Stack Exchange
Package_Management
- How to Convert From RPM to DEB and DEB to RPM Package Using Alien
- Difference Between apt and apt-get Explained
- Why use apt-get upgrade instead of apt-get dist-upgrade? - Ask Ubuntu
- apt - What is "dist-upgrade" and why does it upgrade more than "upgrade"? - Ask Ubuntu
- software installation - How do I install a .deb file via the command line? - Ask Ubuntu
- How to Exclude Specific Package from apt-get Upgrade
- executable - How do I list commands a package provides? - Ask Ubuntu
- command line - How can I know what programs some apt-get package contains? - Ask Ubuntu
- How do I find the package that provides a file? - Ask Ubuntu
- linux - Command to find the source package of a binary? - Super User
- linux - How to find which package certain command belongs to on CentOS? - Super User
- `apt-get update` cannot find Ubuntu servers - Ask Ubuntu
- package management - Difference between .deb files and .run file - Unix & Linux Stack Exchange
- 5 reasons why a Debian package is more than a simple file archive
- What is the difference between deb packages and tar balls ? What are the advantages/disadvantages of each? - Ask Ubuntu
- package management - Easily unpack DEB, edit postinst, and repack DEB - edit control file deb package - Unix & Linux Stack Exchange
- deb content meaning control data - Google Search
- 5. Control files and their fields — Debian Policy Manual v4.3.0.1
- Linux dpkg command cheat sheet for Debian and Ubuntu sysadmins
- How can you completely remove a package? apt purge - Ask Ubuntu
- package management - How to undo apt-get autoremove - restore
- Using a file to install packages with apt-get - Unix & Linux Stack Exchange
- Package manager - source-based distribution
- List of software package management systems - Portage, emerge as hybrid systems, USE flags
- ebuild - USE flags
- The evolution of package managers | Opensource.com
- Portage - Gentoo Wiki - source based package management
- Portage (software) - source based package management - Gentoo Linux, Chrome OS, Sabayon, and Funtoo Linux - meta distribution - Package Manager Specification project (PMS) - emerge, ebuild, USE flags, ufed editor
- Snap documentation | Snapcraft documentation
- Snappy (package manager) - canonical ubuntu - snapcraft
- What is the difference between apt-get update and upgrade? - Ask Ubuntu
- uninstall - What does it mean "Processing Triggers for..." after installing/Uninstalling? - Ask Ubuntu
- DpkgTriggers - Debian Wiki
- Trying to make dpkg triggers more useful and less painful
Networking
- Deprecated Linux Networking Commands and Their Replacements
- What is the difference between netstat and netcat (nc)? - Quora
- Difference Between Telnet and SSH (With Comparison Chart) - Tech Differences
- telnet vs rsh at DuckDuckGo
- Please use Secure Shell (SSH) instead of Telnet or rsh/rcp/rlogin
- https://access.redhat.com/sites/default/files/attachments/rh_ip_command_cheatsheet_1214_jcs_print.pdf
- ifconfig vs ip addr at DuckDuckGo
- Linux disables ethernet auto-negotiation on plugging-in the cable? - Unix & Linux Stack Exchange
- dhclient - Linux / Unix Command
- sys class net unix at DuckDuckGo
- An introduction to using tcpdump at the Linux command line | Opensource.com
- Web Server Guides for Linux Beginners
- opensource.com/article/17/4/build-your-own-name-server?sc_cid=70160000001273HAAQ
- 4 Ways to Speed Up SSH Connections in Linux
- Netcat - backdoor - nmap's ncat - copy with ssh session vs scp
- Use Netcat - not Telnet - to test network connectivity
- Stop using telnet and start using netcat – vs nmap
- Using DD Over Netcat vs SSH [Wiki] | NDCHost
- Connectivity testing with Ping, Telnet, Tracert and PathPing:
- networking - What is the difference between ping and tracert? - Server Fault
- Common Linux network tools - ping, telnet, netstat and arp
- linux - What is the difference between curl, wget and telnet commands? - Super User
- Difference between PuTTY and Telnet | PuTTY vs Telnet
- putty vs ssh at DuckDuckGo
- Bash (shell): What are the differences between host, dig, and nslookup, and when should I use each? - Quora
- linux - How can I get my external IP address in a shell script? - Unix & Linux Stack Exchange
- Learn advanced SSH commands with the new cheat sheet | Opensource.com
- ip - How to find out if Ubuntu is using DHCP (Ubuntu 12.04 LTS GUI) - Unix & Linux Stack Exchange
- How can I setup the MTU for my network interface? - nixCraft
- /etc/network/interfaces Ubuntu Linux networking example - nixCraft
- network - How can I use netcat like ping? - Information Security Stack Exchange
- Linux ip Command Examples - nixCraft
- Can't ping other machines in my network - Super User
- networking - How to see incoming IPs in Linux? - Server Fault
- networking - Why can't I ping any computers on the same hub? - Super User
- mask networking what is it for at DuckDuckGo
- How TCP backlog works in Linux - listen syscall, SYN/ACK
- DEFINITIVE - TCP connection SYN backlog, socket backlog queues - overflowing, half open connections - filling socket backlog - technical steps with netstat, netcat, lsof and tcpdump - SYN_RECV, ESTABLISHED states - kernel, application interactions - accept(2), listen(2) system calls - SYN Flood DDoS Attack
- Magic cookie - Wikipedia
- route (command) - routing table
- Understanding Routing Table - nixCraft
- networking - Understanding Routing table entry - Stack Overflow
- How to View the Network Routing Table in Ubuntu - route -n, ip route, netstat -rn commands
- An introduction to Linux network routing | Opensource.com
- traceroute - tracert
- How to Find The IP Address Of A DHCP server | /var/lib/dhcp/dhclient.lease
- How do I find out my DHCP server address? - /var/lib/dhcp/dhclient.leases
- Domain name resolution - DNS, /etc/resolv.conf, /etc/hosts - NSS, getent, - ArchWiki
- Name Service Switch - NSS - /etc/passwd, /etc/group, /etc/hosts - DNS, NIS, LDAP - nsswitch.conf -
- How to Setup Local DNS Using /etc/hosts File in Linux - name service switch /etc/nssitch.conf -
- filesystem - What is the use of /etc/hosts? - DNS Lookup
- DEFINITIVE - What is the purpose of /etc/hosts? - historical context - vs DNS - priority in /etc/nsswitch.conf
- https://someonewhocares.org/hosts/hosts - example of /etc/hosts file on linux - blacklist
- Managing DNS locally with /etc/hosts | definitive advises - pros/cons - host/nslookup commands - scale - load balancer
- /etc/resolv.conf - DNS resolver on linux - dhcp, resolvconf
- resolvconf - DNS
- How to take back control of /etc/resolv.conf on Linux | NetworkManager, resolvconf, rdnssd, netconfig
- /etc/resolv.conf - Linux Shell Scripting Tutorial - A Beginner's handbook
- DEFINITIVE - The Non-complexity of /etc/nsswitch.conf - myhostname
- ubuntu - Why do I need to change the order of hosts in nsswitch.conf? - Multicast DNS - .local domains
- Why is the root directory on a web server put by default in "/var/www"? - Unix & Linux Stack Exchange
- linux - What is the recommended directory to store website content? - Super User
- dig (command) = Domain Information Groper - supersedes older tools as nslookup, host - belongs to BIND - DNS - resolv.conf, DNS root zone - supports Internationalized domain name (IDN) queries.
- nslookup = Name Server Lookup - host, dig - DNS query
- host (Unix) - DNS lookups - FQDN
- 10 Linux nslookup Command Examples for DNS Lookup - definitive explanation server vs name non authoritative answer - MX mail exchange server record
- NSlookup for Beginners - TechNet Articles - United States (English) - TechNet Wiki
- networking - Understanding results of nslookup - Ask Ubuntu
- linux - NSLookup how to interpret output - Unix & Linux Stack Exchange
- Linux and Unix dig Command Examples - nixCraft
- 8 Linux Dig (Domain Information Groper) Command to Query DNS
- domain name system - DNS - NSLOOKUP what is the meaning of the non-authoritative answer? - Server Fault
- utilities - What is the difference between curl and wget? - Unix & Linux Stack Exchange
- curl vs Wget
- downloads - What is the difference between curl and wget? - Ask Ubuntu
- What is the difference between curl and wget below? - Stack Overflow
- wget vs curl - Google Search
Power_Management
- How can I suspend/hibernate from command line? - Ask Ubuntu
- How does the system shutdown of a linux kernel work internally? - Unix & Linux Stack Exchange
- reboot - How does a computer restart itself? - definitive answer ACPI, soft power, ATX, standby power supply, AT power, , hard power, PS_ON, PS_RDY - power control - power states - reset - motherboard
- linux - "reboot" vs "shutdown -r now": what restart command is safer? - Server Fault
Graphical_Environments
- xorg - What is the X server? - Ask Ubuntu
- freedesktop.org - xdg - X Desktop Group formerly - Wikipedia
- software installation - What is gdm3, kdm, lightdm? How to install and remove them? - Ask Ubuntu
- display manager - What is LightDM and GDM - Unix & Linux Stack Exchange
- X display manager (program type) - Wikipedia
- Difference between Gnome3 and Gnome-shell - Unix & Linux Stack Exchange
- GitHub - GNOME/mutter: Window and compositing manager based on Clutter
- Is there a simple linux command that will tell me what my display manager is? - Unix & Linux Stack Exchange
- X Window System - Wikipedia
- X.Org Server - xserver, x display/window server - ddx, xrandr - Wikipedia
- xorg - How to forward X over SSH to run graphics applications remotely? X Forwarding, xauth, client ~/.ssh/config, server /etc/ssh/sshd_config - Unix & Linux Stack Exchange
- xorg - Why .Xauthority needs not to be owned by the root account in order to get past login? - security - key loggers - Unix & Linux Stack Exchange
- filename - Keyboard Shortcut to Rename File in GUI (Other Than F2) - Gnome Nautilus config file/ shortcut file - Ask Ubuntu
- Kernel Mode Setting (KMS) is a method for setting display resolution and depth in the kernel space rather than user space. The Linux kernel's implementation of KMS enables native resolution in the framebuffer and allows for instant console (tty) switching. KMS also enables newer technologies (such as DRI2) which will help reduce artifacts and increase 3D performance, even kernel space power-saving.
- Kernel Mode Setting (KMS) — Linux GPU Driver Developer Guide
- Mode setting is a software operation that activates a display mode (screen resolution, color depth, and refresh rate) for a computer's display controller. In kernel mode-setting (KMS), the display mode is set by the kernel. In user-space mode-setting (UMS), the display mode is set by a userland process. Kernel mode-setting is more flexible and allows displaying of an error in the case of a fatal system error in the kernel, even when using a user-space display server. User-space mode setting would require superuser privileges for direct hardware access, so kernel-based mode setting shuns such requirement for the user-space graphics server.
- Direct Rendering Manager (DRM), a subsystem of the Linux kernel, interfaces with the GPUs of modern video cards. DRM exposes an API that user-space programs can use to send commands and data to the GPU, and to perform operations such as configuring the mode setting of the display. DRM was first developed as the kernel space component of the X Server's Direct Rendering Infrastructure, but since then it has been used by other graphic stack alternatives such as Wayland. User-space programs can use the DRM API to command the GPU to do hardware-accelerated 3D rendering and video decoding as well as GPGPU computing
- The DRM/KMS subsystem from a newbie's point of view - brezillon-drm-kms.pdf
- KernelModesetting - KMS
Media_Management
Distros_Comparison
- Debian vs Redhat - Best linux distro war - Coding Security
- List of Linux distributions that run from RAM - ram required to run them - Puppy Linux
- 10 Best Lightweight Linux Distributions for Older Computers in 2019 [With System Requirements] - Puppy Linux
- Puppy Linux - Support
- Fatdog64 Linux
- Puppy Linux - Wikipedia
- Light weight Linux distribution - Wikipedia
- Installing Arch Linux from scratch
- Why is Arch Linux so challenging? What are the pros and cons of using it? - Quora
- Should You Install Arch Linux? 10 Reasons for Arch-Based Distros
- Arch Linux: Letting You Build Your Linux System From Scratch
- Puppy Linux Installation and Usage - booting - SFS Squash Filesystem package
- Puppy Linux Supported Architectures - bios, uefi - PAE
- Definitive Breakdown Puppy Linux Internals - how it works - initrd.q, q.sfs, init script, boot partition, performance measurements, recovery and maintenance, version control, layered f.s and switch_root mounting - containers, home, repository - upgrade
- Puppy Linux Frequently Asked Questions (FAQ)
- Frugal or Full Installation: PuppyLinux
- Linux Directory Structure (RootFS): PuppyLinux - /etc/fstab
- Installer Puppy Linux - Les Hirondelles Du Net
- How to install Puppy Linux (frugal) and configure Grub2 bootloader - Linux How-To and Tutorial Section
- How to do a Frugal Puppy Linux 4.3.1 Install to a new Hard disk | MyLinuxRamblings
- Puppy Linux Wiki: PuppyLinux - resources - reference - documentation - docs
- How to install VirtualBox Guest Additions in Puppy Linux 4.0 | 中文Puppy Linux开发者之家
- Gentoo Linux - meta distribution - Portage package management system
- Gentoo Wiki
Certifications
Troubleshooting
Repairing_grub
- dual boot - How can I repair grub? (How to get Ubuntu back after installing Windows?) - Ask Ubuntu
- grub rescue vs grub - Google Search
- boot - GRUB rescue problem after deleting Ubuntu partition! - Ask Ubuntu
- grub2 - How do I fix "Grub Rescue"? Uninstallation? - Ask Ubuntu
- boot - grub rescue -> no such partition - Ask Ubuntu
- boot - error: file '/grub/i386-pc/normal.mod' not found - Ask Ubuntu
- How to backup settings and list of installed packages - Ask Ubuntu
- How to Connect Wi-Fi from Linux Terminal Using Nmcli Command
- memory - How to find L1, L1i, L1d cache from dmidecode output? - CPU
Misc
- How can I extract a page range / a part of a PDF? - Ask Ubuntu
- linux - Merge / convert multiple PDF files into one PDF - Stack Overflow
Refs
- The Linux Documentation Project
- Index of /class/simg211/unixintro
- Welcome to LWN.net [LWN.net] -- Linux Weekly News
- Home | Linux Journal
- The Linux Information Project (LINFO) Home Page
- Learn Linux - slashroot
- ubuntu for phones review - Google Search
- 5 Reasons to Switch to Ubuntu Phone
- DIY: Create multi-boot USBs with ease - TechRepublic
- How To Run Any Android Apps On Linux OS
- Linux totally dominates supercomputers | ZDNet
- Using rsync to back up your Linux system | Opensource.com
- A very simple example of the flexibility and philosophy of Linux
- A Linux Sysadmin's Guide to Network Management, Troubleshooting and Debugging
- Linux Distros On Smartphone: The First "Linux On Galaxy" Demo Is Here
- 30 Linux System Monitoring Tools Every SysAdmin Should Know - nixCraft
- How to run DOS programs in Linux | Opensource.com
- Analyzing the Linux boot process | Opensource.com
- 10 command-line tools for data analysis in Linux | Opensource.com
- Enable Debugging Mode in SSH to Troubleshoot Connectivity Issues
- Quick Reference Guide Scientific Linux for DESY
Process_Management
Process_Environment
- Linux: where are environment variables stored? in process own memory, above process command line arguments list - Kernel make them available in virtual file /proc/<pid>/environ - Stack Overflow
- 12.04 - Environment variables - where are they stored by linux, how do I change them and is it safe to do so? Global VS User environment variables - Ask Ubuntu
- bash - What does "export" do in shell programming? - Stack Overflow
- Environment variable - Wikipedia
- How to permanently set environmental variables - Login/Non-login shell Interactive/Non-interactive shell - minimal environment loaded by shell - bash - /etc/profile, ~/.bash_profile, ~/.bash_login, ~/.profile, ~/.bashrc, BASH_ENV
- bash - How to determine where an environment variable came from - Unix & Linux Stack Exchange
- How To Read and Set Environmental and Shell Variables on a Linux VPS | DigitalOcean
- setenv() — Add, delete, and change environment variables - #define _POSIX1_SOURCE 2 - #include <env.h> - int setenv(const char *var_name, const char *new_value, int change_flag)
- Linux Environment Variables – Local vs Global environment variable
- bash - What exactly is an environment variable? environment definition - execve() - Unix & Linux Stack Exchange
- getenv(), getenv_s() - cppreference.com
- linux - Where is $BASH_ENV usually set? bash environement - PAM, sshd - Bash profiles config files
- sshd - Sourcing BASH_ENV for non-interactive SSH commands - Unix & Linux Stack Exchange
- bash - Environment variable assignment followed by command - definitive explanation by cuonglm - environment variable passing to the process created by command execution - equivalent to exporting variable
- posix - Is it shell portable to run a command on the same line after variable assignment? environment variables
File_descriptors
- kernel - How can same fd in different processes point to the same file? - file descriptor
- File descriptor - definitive visual explanation - TOCTTOU attacks - FD, fildes - table - /proc/<pid>/fd - fcntl() - F_GETFD, F_SETFD, F_GETFL and F_SETFL - mmap(), bind(), connect(), listen() accept() (creates a new file descriptor for an incoming connection) getsockname() getpeername() getsockopt() setsockopt() shutdown() - capabilities - file descriptors table per process, file table, inode table
- linux - C fopen vs open - definitive
- fopen and open - creat system calls
- fopen() — Open a file
- How do I clear the whole contents of a file in C? empty up
- Process Table - context block - PCB
- What is the linux process table ? What does it consist of? - Stack Overflow
- procfs - /proc filesystem - provides a method of communication between kernel space and user space - systctl
Minix
- What Is MINIX? Is The World's Most Popular OS A Threat?
- www.cs.vu.nl/~ast/intel/
- andrew tanenbaum youtube - Google Search
- Operating Systems - UNIX-likes - YouTube - YouTube
- andrew tanenbaum youtube - Google Search
- The Design of a Reliable and Secure Operating System by Andrew Tanenbaum - YouTube
- Andrew Tanenbaum - MINIX 3: A Reliable and Secure Operating System - Codemotion Rome 2015 - YouTube
- Tanenbaum–Torvalds debate - Wikipedia
- Linux Basics « Null Byte :: WonderHowTo
Windows
- Why it matters that Microsoft released old versions of MS-DOS as open source | Opensource.com
- First leaked benchmarks of Windows 10 on ARM alarming - MSPoweruser
- Answer - Quora
- Speed Up Internet Using CMD (Command Prompt)
Command_Line
- Some Windows command line tricks you may not know - Coding Security
- Top 200+ Best CMD Tricks,Tips And Hacks Of 2018 (CMD StarWars)
- Powershell remoting for the masses made easy with parallelexecution module | Fernando Rubio Román | Pulse | LinkedIn
- Environment Variables | Microsoft Docs
- windows - List all environment variables from command line? - Stack Overflow
- gci powershell at DuckDuckGo
- Percent symbols - % - Windows CMD - SS64.com
- How To Create Undeletable Folder In Windows
Windows_Kernel
- Compiler bug? Linker bug? Windows Kernel bug. | Random ASCII
- One Windows Kernel - Microsoft Tech Community - 267142
Maintainance-Troubleshooting
- Fix Limited Access in Windows 7 (WiFi Unidentified Network)
- Using Ping to Troubleshoot Network Problem
- Windows Troubleshooting - Advanced DNS Query Debugging with NSLookup
- windows management framework wikipdia at DuckDuckGo
- PowerShell - Wikipedia
- power shell vs linux terminal at DuckDuckGo
- netsh - Wikipedia
- Using the App File Explorer to see your app data - Windows Developer BlogWindows Developer Blog
- How to Access the Application Data Folder | Techwalla.com
Registry
- registry windows what is at DuckDuckGo
- Windows Registry - Wikipedia
Mac_OS_X
Setting_up_Hackintosh
- What Is A Hackintosh Computer? Is It Illegal To Hackintosh My Laptop?
- Leveraging Emond on macOS For Persistence – Posts By SpecterOps Team Members
Mobile_OSes
Android
- how does termux work at DuckDuckGo
Useful_Apps
- 10 best Android Apps which are not available on Google Play Store » TechWorm
- How Facebook Is Ruining Your Android (and What You Can Do)
- Google to help developers build automated driving modes by opening the API behind Pixel 2’s Do-Not-Disturb | VentureBeat
- 5 Android Hacks You Can Do Without Rooting Your Mobile
- How to Find Your Android Device Info for Correct APK's Download
- How To Speed Up Android Device After Rooting
- Secret settings hidden in your Android phone will make it feel twice as fast – BGR
iOS
- iPhone’s Apple Health data used as evidence in murder trial – Naked Security
- Mobile operating system - Wikipedia
Building_Own_OSes_Projects
- How do operating systems… run… without having an OS to run in? - Software Engineering Stack Exchange
- When do you require an operating system for a given microcontroller? Is it required whenever I interface the controller with external hardware?
- Is it always necessary to have an operating system? - Quora
- GitHub - tuhdo/os01: Bootstrap yourself to write an OS from scratch. A book for self-learner.
- GitHub - tuhdo/sample-os: A sample OS as demonstrated in the book Operating System: From 0 to 1
- Writing an OS *from scratch*
- Fuchsia OS : C++ est-il plus avantageux que C pour le développement d'un microkernel ? Le choix de Google divise
- Operating Systems: Three Easy Pieces
- GitHub - Cryptogenic/JinxOS: JinxOS is a minimalist operating system written in C and ARM. The focus is to quickly and easily interface with connected hardware for education and testing purposes.
- Build simple Operating System for Raspberry Pi
- Introduction - Operating System Development
- How to write a simple operating system in assembly language
- Operating System: Development Guide - definitive stet by step turorials series -- Boot Sector Structure - First Bootloader Code - Setting up a Toolchain and Using Bochs - File Allocation Table (FAT) and Reading from Disk - Using Makefiles and the Second stage Bootloader - Memory and How the CPU Accesses it - Protected Mode and the Global Descriptor Table (GDT) - Setting up the Interrupt Descriptor Table (IDT) - Enabling the A20 Line - Jumping to Protected Mode - First and Second Stage Bootloaders - Hercules CGA Emulators: How do they work? - In the Beginning was the Command Line
Platform-Agnostic_Concepts
File-Systems
File_Formats
- What is the difference between an ISO and an SFS file? - Quora
- IMG (file format) - refers to binary files with the .img filename extension that store raw disk images of floppy disks, hard drives, and optical discs or a vector image - vs ISO, ISO 9660 (for CDs) or UDF (for DVDs) - CUE/BIN and CCD/IMG formats, which usually contain raw disc images, can also store ISO images instead - BIN Format, .bin files
- ISO image - Wikipedia
- What is the difference between an .iso file and an .img file? - Quora
- What Are the Differences Between ISO and IMG Files? | Techwalla.com
- Cue sheet (computing) - metadata file - CUE/BIN binary format .bin files - CD ripping
- Disk image - mounting/unmounting - FDE on-the-fly disk OTFE, FreeOTFE and TrueCrypt - Virtual machine image
- INI file - Wikipedia
- File system - Wikipedia
Archives_and_Compression
- Tar Vs Ar vs Zip Vs Gz : Difference And Efficiency
- An Introduction to File Compression Tools on Linux Servers - lossy/lossless compression basics - tar archives - gzip .gz VS bzip2 .bz2 VS LZMA2 .xz - | DigitalOcean
- Which is more efficient - tar or zip compression? What is the difference between tar and zip? - Super User
- Why are tar archive formats switching to xz compression to replace bzip2 and what about gzip? - Unix & Linux Stack Exchange
- compression - How many times can a file be compressed? - Stack Overflow
- Can compressed files be compressed further? - Quora
- compression - Can Double Zipping Cause Problems? - Super User
- compression - Pros and cons of bzip vs gzip? - Super User
- How to open rar file in linux? - Unix & Linux Stack Exchange
- linux archive difference directory - Google Search
- Archive file - Wikipedia
- List of archive formats - Wikipedia
- Comparison of archive formats - Wikipedia
- What is data archiving? - Definition from WhatIs.com
- Use tar vs bzip2 for creating a .tar.bz2 archive? - Super User
- DEFINITIVE - Compressing/Decompressing files under Linux or UNIX - list files without decompressing the archive - definitive cheat sheet - gzip, tar, zip, bzip formats
- Volume = logical drive - a single accessible storage area with a single file system, typically (though not necessarily) resident on a single partition of a hard disk. Although a volume might be different from a physical disk drive, it can still be accessed with an operating system's logical interface - Differences with partition
- Is a Container, Volume/Logical Volume, or Partition all the Same?
- filesystems - Device vs Partition vs File System vs Volume: how do these concepts relate to each other, accurately - Definitive Data, storage device, filsystem definitions
- The Difference Between a Drive, Disk, Volume, Partition, and Image - Make Tech Easier
- DEFINITIVE - Differences between volume, partition and drive - LVMs - hard disk, SSD - SATA, PATA, SCSI, IDE - device nodes - MBR/GPT
- server - What is LVM and what is it used for? - Ask Ubuntu
- Logical Volume Manager (Linux) - device mapper target that provides logical volume management for the Linux kernel. Most modern Linux distributions are LVM-aware to the point of being able to have their root file systems on a logical volume - RAID - CLVM, HA-LVM, lvmlockd - Implementation details - Caveats
- Logical Disk Manager LDM - an implementation of a logical volume manager LVM for Microsoft Windows NT
- FAT filesystem and Linux compatibility - drivers - VFAT, msdos, umsdos
- Design of the FAT file system - VFAT long file names
- File Allocation Table FAT - file system architecure - 8-bit FAT, FAT12, Initial/Final FAT16, Logical Sectored FAT, FAT32 - 4 GiB file size limit - Extended Attributes, long file names - Turbo AT, FATX, exFAT, FAT+
- filesystems - What is the difference between VFAT and FAT32 file systems? -
- 3 Ways to Remove Write Protection on an SD Card - Physical Lock Switch - read only file system problem
- What is file system? - Definition from WhatIs.com
- List of file systems - Wikipedia
- FAT - File Allocation Table (FAT) is a computer file system architecture and a family of industry-standard file systems utilizing it. The FAT file system is a legacy file system which is simple and robust.
- command line - Why the "v" in mkfs.vfat? FAT12, FAT16, vFAT, FAT32
- Clipboard (computing) - Wikipedia
- balena-io/etcher: Flash OS images to SD cards & USB drives, safely and easily - File Writing Tool
Drivers
- Proprietary device driver = Binary Blob - Wikipedia
- Device driver - Wikipedia
- Character device drivers — The Linux Kernel documentation
- Talking To Device Files - ioctl -
- terminology - Is there any difference between the terms userland and userspace? - Computer Science Stack Exchange
- User space/Userland - Kernel Space - debuggers - shared memory in IPC - system call interface SCI - Implementation through Protection Rings
Processes
- Child process - subprocess, subtask - fork, spawn - init process
References
- Expanded Main Page - OSDev Wiki
- 7 Risks of Dual Booting Windows and Linux Operating Systems
- linux - What is difference between User space and Kernel space? - CPU ring
Networking
Protocol_Implementations
Ethernet
HTTP
- The HTTP series (Part 1): Overview of the basic concepts - CodeProject
- RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
- RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
- What happens when you type an URL in the browser and press enter? HTTP, TCP IP Stack, DNS Query, Cache, ISP, Browser - Root/Top-Level/Second-Level/Third-Level Domains definitive visual explanation
- What Happens When You Type a Url in Your Browser and Press Enter - definitive breakdown - tcp syn segments, dns cache, DNS request in UDP datagram - MAC Address, ARP table - NAT - internal-to-external translation/external-to-internal translation - Connection: Keep-Alive HTTP
ARP
- What is Address Resolution Protocol (ARP) and How does it Work ?
- 3 Things You Wanted To Know But Never Asked About MAC Addresses
WebSockets
- WebSockets versus REST?
- what is a socket networking at DuckDuckGo
- networking - What is the difference between a port and a socket? - Stack Overflow
- About HTML5 WebSocket - Powered by Kaazing
- HTML5 WebSocket - A Quantum Leap in Scalability for the Web
- ajax - WebSockets protocol vs HTTP - Stack Overflow
- ajax vs websocket at DuckDuckGo
- WebSocket - The Wireshark Wiki
- About HTML5 WebSocket - Powered by Kaazing
- HTML5 WebSocket - A Quantum Leap in Scalability for the Web
Industrial_Networking_Protocols
- tls over mqtt at DuckDuckGo
- amqp vs mqtt - Google Search
- RabbitMQ, AMQP, MQTT & Rest of the world – Sakib Sami – Medium
- Tutorial: Secure TLS Communication with MQTT using mbedTLS on top of lwip | MCU on Eclipse
- ethernet vs industrial ethernet at DuckDuckGo
- usb vs ethernet at DuckDuckGo
- differencebetween.net/technology/hardware-technology/difference-between-usb-and-ethernet/
- What-is-the-difference-between-Ethernet-and-Industrial-Ethernet - Quora
- opc ua in avionics at DuckDuckGo
- OPC Unified Architecture - Wikipedia
- opc ua over tsn - Google Search
- io link vs opc ua at DuckDuckGo
- OPC ua vs opc classic - Google Search
- opc ua over mqtt at DuckDuckGo
- Modbus - Wikipedia
- What is CAN Bus?
- CAN bus - Wikipedia
- CAN Bus Explained - A Simple Intro (2018)
- opc ua car industry at DuckDuckGo
- OPC UA ANSIC! The official UA ANSI-C Stack and Sample Applications from the OPC Foundation
- opc ua over mqtt at DuckDuckGo
- communication - OPC UA protocol vs MQTT protocol - Stack Overflow
- OPC UA: The Information Backbone of the Industrial Internet | GE Automation
- profinet vs opc ua at DuckDuckGo
- OPC and OPC UA explained
- OPC UA Adoption by Honeywell Process Solutions | Automation.com
- GitHub - OPCFoundation/UA-AnsiC: UA ANSI C Stack reference implementation for OPC UA
- profinet vs ethernet at DuckDuckGo
- profinet siemens at DuckDuckGo
- Fieldbus - Wikipedia
- io link - Google Search
- amqp at DuckDuckGo
- RabbitMQ, AMQP, MQTT & Rest of the world – Hacker Noon
- Anybus X-gateway - Network to Network & IIOT Gateways
- networkmanagementsoftware.com/introduction-network-protocols/
- 6 must-read internet standards | Opensource.com
- Serial communication - Wikipedia
- RS-232 - Wikipedia
- data transmission - OSI Model - layer 1 physical, layer 2 data link, layer 6 presentation - cryptography
- communication channel
- long-haul communication
- Computer network - Wikipedia
- Network News Transfer Protocol - Wikipedia
Fundamentals
- Duplex (telecommunications) - Wikipedia
- What is the loopback device and how do I use it? - Ask Ubuntu
- bootp vs dhcp at DuckDuckGo
- tcp vs http at DuckDuckGo
Hardware
- Why You Need to Reboot a Router - Consumer Reports
- Why does restarting/resetting the router work? - Super User
- why is it necessary to reboot router to connect to WiFi at DuckDuckGo
- What Is a Network Switch, and Do You Need One?: Reviews by Wirecutter | A New York Times Company
- Router vs Switch vs Hub: What's the Difference? Webopedia
- network interface vs network card at DuckDuckGo
- what is network interface at DuckDuckGo
VoIP
- why do voip apps need phone number at DuckDuckGo
- subnetting theory course pdf - Google Search
- Networking - YouTube - YouTube
- subnetting theory course pdf - Google Search
- osi model pdf - Google Search
- Networking Basics: TCP, UDP, TCP/IP and OSI Model | TCP vs UDP - MTU
- TCP/IP and Networking Fundamentals for IT Pros | Pluralsight
- Cisco CCNA Course: Introduction to Networking | Pluralsight
- TCP/IP Networking for Developers | Pluralsight
- The Complete Networking Fundamentals Course. Your CCNA start | Udemy
- Cisco Networking Fundamentals & LABS! | Udemy
- Video_Notes_On_Tanenbaum_Network_Book_5thEd
- hub vs switch vs router at DuckDuckGo
- Learn the Fundamentals of Networking | Udemy
- best tutorial packet tracer cisco at DuckDuckGo
- How to learn how to use Cisco Packet Tracer from beginning - Quora
- Cisco Packet Tracer Tutorial - Resources to Download Cisco Packet Tracer
- Tutorials | Welcome to DNS Made Easy Tutorials
- Networking Basics « Null Byte :: WonderHowTo
- Free Networking tutorials, System Administration Tutorials and Security Tutorials - omnisecu.com
- How broadband Internet works - Explain that Stuff
- A Hitchhiker's Guide to the Internet: Today and Now, How It All Connects « Null Byte :: WonderHowTo
- A Hitchhiker's Guide to the Internet: A Brief History of How the Net Came to Be « Null Byte :: WonderHowTo
- Hacker Fundamentals: A Tale of Two Standards « Null Byte :: WonderHowTo
- Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web « Null Byte :: WonderHowTo
- networking - Why do computers have 65,535 TCP ports? - Super User
- Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 1 « Null Byte :: WonderHowTo
- Hack Like a Pro: Networking Basics for the Aspiring Hacker, Part 2 (TCP/IP) « Null Byte :: WonderHowTo
Proxys
- what is a gateway in networking at DuckDuckGo
- How to setup a transparent proxy server for wifi with zero client configuration like in airports and coffee shops? : sysadmin
- What is a transparent proxy? | ExpressVPN
- API proxy or gateway? | API Management Blog - Akana
- What is the difference between a proxy and a VPN? - Quora
- What is the difference between a Gateway and a Firewall? - Information Security Stack Exchange
- what's distinction of HTTP proxy, tunnel, gateway? - Stack Overflow
- What are the differences among proxy, gateway and tunnel? - Quora
- Difference Between a Proxy Server & a Gateway | Techwalla.com
- Difference Between Gateway & Router | Techwalla.com
- Proxifier - The Most Advanced Proxy Client
- tunneling - How to force ALL programs to use my Proxy? - Information Security Stack Exchange
- Proxy server - Wikipedia
- [HOW TO] Use PROXIFIER to run applications through proxies + Installation Tutorial | TBN
- Understanding IP Addresses, Subnets, and CIDR Notation for Networking | DigitalOcean
- Classless Inter-Domain Routing - cidr - Wikipedia
- ipv4 - The slash after an IP Address - CIDR Notation - Network Engineering Stack Exchange
- network interface - Show netmask using ip tool - Unix & Linux Stack Exchange
- Telecommunication - Wikipedia
- Network address - Wikipedia
- networking - What is the difference between a port and a socket? - Stack Overflow
- What is the difference between a packet and a frame with reference to the OSI model? - Quora
- Difference Between Segments, Packets and Frames
- networking - Difference between PACKETS and FRAMES - segments - datagrams - definitive comparison
- networking - Frame-based and stream-based protocols - Stack Overflow
- internet - What are the differences in the contents of datagrams, frames, segments and network packets? definitive visual explanation - Application data as FTP, HTTP
- IPv6 Fragmentation - vs IPv4 vulnerabilities - RA-Guard antivirus evasion | NETSCOUT
- IPv4 - Fragmentation_and_reassembly
- IP fragmentation - Wikipedia
- TCP connection status/state table and diagram - definitive breakdown
- TCP half-open - embryonic connection - Wikipedia
- Handshake - handshaking - telecommunications - TCP, TLS, SMTP, WPA2 wireless, Dial-up access modems - Wikipedia
- State (computer science) - stateful program, staeless protocol - Wikipedia
- Stateless/Stateful protocol - Wikipedia
- Memcached - general-purpose distributed memory caching system. It is often used to speed up dynamic database-driven websites by caching data and objects in RAM to reduce the number of times an external data source (such as a database or API) must be read
- What is TCP/IP | Cloudflare
- What is UDP/IP - vs TCP - vulnerabilities
- Network scheduler - aka packet scheduler, queueing discipline, qdisc or queueing algorithm, is an arbiter on a node in packet switching communication network. It manages the sequence of network packets in the transmit and receive queues of the network interface controller
- python - What is "backlog" in TCP connections? three way handshake requests queue
- Understanding socket and port in TCP - Backlog Queue – Fantageek – Medium
- Understanding TCP/IP Network Stack & Writing Network Apps - There is the TCP Control Block (TCB) structure connected to the socket. The TCB includes data required for processing the TCP connection. Data in the TCB are connection state (LISTEN, ESTABLISHED, TIME_WAIT), receive window, congestion window, sequence number, resending timer, etc.
- Increasing the Size of the TCB Hash Table - TCP Transmission Control Block
- RFC 791 - Internet Protocol IP Specifications - 1981
- Transmission Control Block, TCB
- Transmission Control Protocol TCP - Header - Segment structure - IPv4/IPv6 checksums - Three-way handshake - states - Vulnerabilities, DDOS SYN Flood/Cookies cryptographic puzzles, sockstress, PUSH/ACK Floods abuse of TCP Persist Timer, connection hijacking, TCP veto, TCP reset - Sequence/Acknowledgment number - Transmission Control Block TCB - datagram
- SPECIFICATION OF INTERNET TRANSMISSION CONTROL PROGRAM - TCP (Version 2) - Vinton Cerf - March 1977
- Internet protocol suite = TCP/IP - aka Department of Defense (DoD) model because the development of the networking method was funded by the United States Department of Defense through DARPA
- Internet Protocol - IP
- IP header - Wikipedia
- Encapsulation (networking) - Wikipedia
- What’s The Difference Between The OSI Seven-Layer Network Model And TCP/IP 4-Layers Model? TCP header vs IP header - IPv4 vs IPv6 headers
- What is the difference between TCP and IP protocols ? TCP vs IP definitive breakdown - IP is a NETWORK Layer protocole, TCP is a TRANSMISSION Layer Protocol
- RFC 1594 - FYI on FAQ Questions and Answers - Answers to Commonly asked "New Internet User" Questions - definitive answers to misc basic questions - Internet, TCP - IETF, IAB, IRTF, IANA, NIC, NOC, InterNIC, , DDN NIC, IR, Telnet
- RFC 793 - Transmission Control Protocol TCP - DARPA INTERNET PROGRAM - PROTOCOL SPECIFICATION - September 1981
- Flooding (computer networking) - Wikipedia
- Reverse-path forwarding - RPF - Unicast RPF uRPF as mitigation against IP spoofing used in DDoS
- Data link layer - Wikipedia
- What is a TCP 3-way handshake? sequence number - full duplex
- What is HTTP - method, verb - request headers - request body - HTTP response, status code, response headers, optional body - DDOS - stateless protocol definition - HTTP request use TCP connections, HTTP 1.1 use persistent TCP connections
- What is The OSI Model | Cloudflare
- Hypertext Transfer Protocol - HTTP - TRACE verb in cross-site tracing attack - security
- POST - HTTP Verb
- Header (computing) - Wikipedia
- Network packet - vs frame - encapsulation
- Network layer - OSI Model Layer 3 - packet forwarding
DNS
- Pseudo-top-level domain - .bitnet, .csnet, .oz, and .uucp, .exit, .i2p, .onion
- Alternative DNS root - Wikipedia
- Domain Name System - DNS - hosts - NXDOMAIN in RCODE Flag - Security issues, Domain Name System Security Extensions (DNSSEC) , cryptographic authentication/signature - DNS primarily uses the User Datagram Protocol (UDP) on port number 53 to serve requests
- .local - multicast domain name service (mDNS) or local Domain Name System servers
- .arpa - top-level domain (TLD) in the Domain Name System
- Top-level domain - Wikipedia
- How To Easily Access Your Home Network From Anywhere With Dynamic DNS - DDNS - router port forwarding
- Name server - authoritative name server
- Root name server - Wikipedia
- Google Public DNS - DNS Cache poisoning, security
- networking - Why should I use DNS 8.8.8.8? - google public dns
- networking - Google's DNS service: Google public DNS - privacy violation, subpoena, government surveillance
- Domain Name System Explained - definitive article - security - jargon/terminology/technical terms - tools/commands - authoritative vs recursive server
- What Is TLD Name Server? top-level domain
- How DNS Works
- What is DNS?
- internet - How should I choose my DNS? - Super User
- How a DNS Server (Domain Name System) works. - YouTube
- What is Domain Name Resolution
- The Domain Name System - DNS
- browser - Difference between DNS and /etc/hosts in name resolving during an HTTPS request - Super User
- Domain Name System Security Extensions - DNSSEC
- Internationalized domain name - IDN
- List of DNS record types - Wikipedia
- WHOIS - RFC 3912 - WEIRDS RDAP - Wikipedia
- Using dig +trace commands to Understand DNS Resolution from Start to Finish
- Autonomous system (Internet) - ASN Autonomous Systsem Number - BGP Border gateway protocol - IANA Internet assigned numbers authority, RIR reigional internet registry
- Point-to-point (telecommunications) - Wikipedia
- List of IP protocol numbers - Wikipedia
- RFC 2784 - Generic Routing Encapsulation (GRE)
- RFC 2890 - Key and Sequence Number Extensions to GRE - Generic Routing Encapsulation
- Overlay network - Wikipedia
- protocol theory - What problem does GRE solve? MPLS, EBGP, Anti-DDoS services, over IPSEC
- Multiprotocol Label Switching - MPLS
- networking - Ethernet vs TCP vs IP? definitive answers with anologies
- Generic Routing Encapsulation - GRE
- What is Generic Routing Encapsulation (GRE)? - Definition from WhatIs.com
- What is Generic Routing Encapsulation (GRE) and how does it differ from IP-in-IP? ip-to-ip, VPN, WAN
- Generic Routing Encapsulation (GRE) - TechLibrary - Juniper Networks
- GRE tunnel, why and what for ? - contiguous networks
- Protocol stack - The protocol stack or network stack is an implementation of a computer networking protocol suite or protocol family. Some of these terms are used interchangeably but strictly speaking, the suite is the definition of the communication protocols, and the stack is the software implementation of them - definitive IP protocol implementation - OSI Layered Model, spanning layer
- Point-to-Point Protocol - PPP - data link layer (layer 2) communications protocol used to establish a direct connection between two nodes. It connects two routers directly without any host or any other networking device in between. It can provide connection authentication, transmission encryption, and compression.
- DECnet is a suite of network protocols created by Digital Equipment Corporation. Originally released in 1975 in order to connect two PDP-11 minicomputers, it evolved into one of the first peer-to-peer network architectures
- Bridging (networking) - Transparent - Ethernet - wireless bride - OSI Layer 2 Data Link - vs Routing
- Routing - Wikipedia
- Border Gateway Protocol - BGP
- Single point of failure - SPoF
- OSI Model – definitive - packet travelling - MAC address = Burned In Address BIA
- DEFINITIVE answers - ip - How do you calculate the netmask prefix length, network, subnet, and host numbers? subnetting -
- Ethernet frame - Destination/Source MAC address - Ethernet packet on OSI Physical Layer 1 , Ethernet frame on OSI Data Link Layer 2 - Jumbo frames
- How does a switch learn a MAC address not in its lookup table? - broadacast vs flood
- MAC address - Media access control address
- Network interface controller - NIC - network interface card, network adapter, LAN adapter or physical network interface
- Jumbo frame - Wikipedia
- IP address - Private addresses - classes A, B, C - Network Address Translation NAT - subnetting
- Network address translation - NAT - IPv4 address exhaustion - TCP/UDP - Microsoft Secure NAT SNAT - NAPT, DNAT - port address translation (PAT), IP masquerading, NAT overload and many-to-one NAT
- Subnetwork - subnetting
- Subnetting Tutorials - subnetworks
- Network Address Translation (NAT) - GeeksforGeeks
- Network Devices (Active/Passive Hub, Repeater, Bridge, Switch, Router, Gateways and Brouter) - GeeksforGeeks
- Circuit Switching in Computer Network - GeeksforGeeks
- Packet Switching and Delays in Computer Network - GeeksforGeeks
- How DHCP server dynamically assigns IP address to a host? - GeeksforGeeks
- networking - What makes a private IP address not routable? ISP LANs - ping - map ISP private network
- What is NAT and how does it work tutorial - Network Address Translation within firewalls and routers - types of NAT, Static/Dynamic/PAT - IPv6
- DEFINITIVE - What is the exact use of a MAC address? - vs IP - Ethernet - OSI Layers Model - ARP - How MAC addresses are generated, byte pattern meaning/significance
- 5 big misconceptions about virtual LANs | 802.1Q trunks, security
- Virtual LAN - VLAN - scalability
- Monitoring and Tuning the Linux Networking Stack: Receiving Data - definitive in depths technical epxlanation
- User Datagram Protocol - UDP - Used as underlying protocol for DNS, SNMP, RIP, DHCP, OpenVPN - UDP vs TCP comparison
- Routing table - Wikipedia
- Routing protocol - gateways
- RFC 1918 - Address Allocation for Private Internets
- Private network - Wikipedia
- List of TCP and UDP port numbers - definitive - well-known/system ports - privileges
- networking - What do the different formats for network addresses indicate? - Super User
- forwarding - How does Router know where to forward packet - NAT, PAT, NAPT
- RFC 2663 - IP Network Address Translator (NAT) Terminology and Considerations
- How incoming NAT traffic can be routed to an internal IP? - Quora
- routing - Very simple NAT question. How does a packet get back out? DNAT
- routing - How does NAT share one public IPv4 address across multiple private IPv4 addresses - Network Engineering Stack Exchange
- UDP hole punching NAT port - Network Engineering Stack Exchange
- Understanding Port Forwarding- Beginners Guide
- How to Set Up a Home Network- Beginners Guide - LAN
- How to Setup and Configure your Home Router - LAN
- Internal and External IP Addresses - NAT router
- Types of Network Address Translation (NAT) - PAT, Dynamic/Static NAT
- Medium access control - MAC sublayer - In IEEE 802 LAN/MAN standards, the medium access control (MAC) sublayer is the layer that controls the hardware responsible for interaction with the wired, optical or wireless transmission medium. The MAC sublayer and the logical link control (LLC) sublayer together make up the data link layer.
- Connectionless communication - Wikipedia
- Connection-oriented communication - Wikipedia
- RFC 826 - An Ethernet Address Resolution Protocol: Or Converting Network Protocol Addresses to 48.bit Ethernet Address for Transmission on Ethernet Hardware - ARP - MAC address
- What Is The Difference Between LAN, WAN, MAN, CAN, VPN, BAN, NAN, SAN?
- What is the difference between a PAN and a LAN network? - Quora
- Personal area network - PAN
- Address plus Port - approach to the IPv4 address exhaustion/shortage - RFC 6346
- IPv4 address exhaustion/shortage - Wikipedia
- RFC 6346 - The Address plus Port (A+P) Approach to the IPv4 Address Shortage/Exhaustion
- Mapping of Address and Port - MAP is an (almost) stateless alternative to Carrier Grade NAT and DS-Lite that pushes the IPv4 IP address/port translation function (and therefore the maintenance of NAT state) entirely into the existing customer premises equipment IPv4 NAT implementation, thus avoiding the NAT444 and statefulness problems of Carrier Grade NAT in operator network, and also provides a transition mechanism for the deployment of native IPv6 at the same time with very little added complexity
NTP
- Network Time Protocol - NTP - Uses UDP on port 123
- RFC 5905 - Network Time Protocol Version 4: Protocol and Algorithms Specification - NTP - Simple NTP SNTP - Crypto-NAK - kiss-of-death
- Clock synchronization - clock drift
- What is Network Time Protocol (NTP)? - atomic clocks, GPS clocks
- time - NTP - How are NTP servers so accurate - Super User
- Network Time Synchronization - Why You Need An NTP Server — Masterclock, Inc.
- Circuit switching - virtual circuit switching - vs datagram packet switching
- Trusted time - source - NTP
- NTP Basics [Knowledge Base]
- Home - Network Time Foundation
- NTP Project - Network Time Foundation - Network Time Security
- Precision Time Protocol - vs PTP, GPS
- RFC 7822 - Network Time Protocol Version 4 (NTPv4) Extension Fields
- Trailer (computing) - metadata - OSI model's layer 2 data link - ethernet frame
- Frame (networking) - packet switching - interframe gap - ethernet frames, point-to-point protocol PPP frames
- Protocol data unit - PDU - datagram vs segment vs packet - packet switching, service data unit SDU - MTU Maximum Transmission Unit, IP fragmentation - definitive breakdowns terms depending on OSI model layer
- Service data unit - SDU - vs protocol data unit (PDU) - encapsulation - fragmentation, MTU
- Sublayer - OSI Model
- Symbol rate - aka baud rate / modulation rate - gross bitrate
- Bit rate - Wikipedia
- Bitstream - binary sequence, is a sequence of bits - byte stream - endianness/byte order
- Payload (computing) - security, programming, networking - malware malicious payload
- Interpacket gap - minimal pause may be required between network packets or network frames. This time between packets is known as the interpacket gap (IPG), interframe spacing, or interframe gap (IFG). Depending on the physical layer protocol or encoding used, the pause may be necessary to allow for receiver clock recovery, permitting the receiver to prepare for another packet (e.g. powering up from a low-power state) or another purpose.
- Datagram - basic transfer unit associated with a packet-switched network. Datagrams are typically structured in header and payload sections. Datagrams provide a connectionless communication service across a packet-switched network.
- Overhead bit - Wikipedia
- Virtual circuit - VC - means of transporting data over a packet switched computer network in such a way that it appears as though there is a dedicated physical layer link between the source and destination end systems of this data. - OSI Layer 4 TCP, layer 2/3 data link / network - circuit switching
- Reliability (computer networking) - reliable/unreliable networks - Reliable delivery in real-time systems - avionics
- Lists of network protocols - Wikipedia
- ntp server at DuckDuckGo
Network_Types
Mesh_Networking
- bgr.com/2018/01/11/best-wifi-router-on-amazon-nighthawk/#ampshare=http://bgr.com/2018/01/11/best-wifi-router-on-amazon-nighthawk/
- Qualcomm: Mesh networking is the future of smart homes | ZDNet
- A mesh network spontaneously erupts in the US and helps connect Puerto Rico – TechCrunch
- https://en.wikipedia.org/wiki/Decentralization
- What is WAN (Wide Area Network)?
Wireless
RFID-NFC
- rfid vs nfc at DuckDuckGo
- What's the difference between RFID and NFC? | HowStuffWorks
- What’s the Difference Between 2.4 and 5-Ghz Wi-Fi (and Which Should I Use)?
5G
- [Update: Ajit Pai responds] White House security document proposes a nationalized 5G wireless network
- Access Point Name - Wikipedia
- How do 2G 3G 4G work? What role does frequency play here? What are bands?
- How to turn your Android smartphone or an iPhone into a satellite phone » TechWorm
- thehackernews.com/2018/01/wpa3-wifi-security.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed:+TheHackersNews+(The+Hackers+News+-+Security+Blog)&m=1
- Difference between Tethering and Hotspot | Difference Between
- how smartphone wifi tethering works at DuckDuckGo
- electromagnetic radiation - How can wifi penetrate through walls when visible light can't? - Physics Stack Exchange
4G
- 4G is All-IP - How 4G Works | HowStuffWorks
- Super high-speed internet delivered over the air isn't as crazy as it sounds - The Verge
- cellular wireless vs wifi stack exchange - Google Search
- What is the difference between Wi-Fi and WLAN? - Quora
- Pocket WiFi vs SIM Card vs Data Roaming | Comparison
- Wi-Fi vs. Ethernet: How Much Better Is a Wired Connection?
- What is the difference between WiFi and a mobile hotspot? - Quora
- What’s the difference between Wi‑Fi data and cellular data? | Verizon Wireless
- What is the difference between WiFi and cellular connection? - Quora
- wifi - Security of wireless connection vs. wired connection on wireless router - Information Security Stack Exchange
- ieee 802.11 - Difference Between Wireless & Wi-Fi - Network Engineering Stack Exchange
- low power - Comparison of wireless communication technologies: bluetooth vs wifi - Electrical Engineering Stack Exchange
- wifi frequency vs bluetooth - Google Search
- Here's What Wi-Fi Would Look Like If We Could See It - VICE
- What is the difference between radio wave and WIFI? Why can’t we use traditional radio wave as our internet communication? - Quora
- Is a WiFi the same as microwave and a Radio Frequency (RF) radiation? - DefenderShield
- WiFi vs. Bluetooth: Wireless Electronics Basics | EAGLE | Blog
- WiFi Networking: Radio Wave Basics
- What is the difference between Wi-Fi, long-distance radio, and cell phone technology? | MacRumors Forums
- Wi-Fi Router Dangers - Electromagnetic Field (EMF) Safety from Safe Space Protection
World_Wide_Web
Decentralized_Web_Architectures
- Why Decentralization Matters – Chris Dixon – Medium
- Projects - Protocol Labs
- IPFS is the Distributed Web
- IPLD - The data model of the content-addressable web
- The Cyber Security Hub™ on LinkedIn: "via 101Blockchains"
Browsers
- User agent - Wikipedia
Browsers_Brands
- Mozilla's speedy new Firefox Quantum browser drops tomorrow
- Firefox 57: Good news? It's nippy. Bad news? It'll also trash your add-ons • The Register
- Firefox Quantum released
- Introducing the New Firefox: Firefox Quantum - The Mozilla Blog
- Why Firefox Had to Kill Your Favorite Extension
- Firefox Private Browsing vs. Chrome Incognito: Which is Faster? - The Mozilla Blog
- Firefox Quantum is a Really Great Browser - ExtremeTech
- how to search bookmarks by contents in firefox at DuckDuckGo
- Why I Switched From Chrome to Firefox Quantum
- Firefox Quantum Isn’t Just “Copying” Chrome: It’s Much More Powerful
- lifehacker.com/why-you-should-switch-from-google-chrome-to-firefox-1821879163#ampshare=https://lifehacker.com/why-you-should-switch-from-google-chrome-to-firefox-1821879163
- Ciao, Chrome: Firefox Quantum Is The Browser Built for 2017 | WIRED
- Bye, Chrome: Why I’m switching to Firefox and you should too
- 5 Alternative New Browsers to Replace Chrome
- Google Wants to Kill the URL | WIRED
- Will tech firms challenge China's 'open' internet? - BBC News
- Save the Internet: FCC Unveils Plan to Rollback Net-Neutrality Rules
- How a Web Browser Communicates With a Server
- Un ingénieur de Google veut remplacer les cookies par des jetons HTTP générés et contrôlés par le navigateur, pour une meilleure sécurité en ligne
- Web server - Wikipedia
- World Wide Web - WWW
- hosts (file) - security - spoofing, redirection to malicious sites
- Hosts File and DNS - /etc/hosts - Virtual Hosts, apache, nginx - definitive
- The Hosts File and what it can do for you - linux, windows, apple file locations
- What Is the Windows Host File? And 6 Surprising Ways to Use It -
- iis 7.5 - Is DNS server And Host file Are different? - Stack Overflow
- Mapping URLs to Filesystem Locations - Apache HTTP Server Version 2.5
- apache - What is Apache HTTPD exactly? tomcat, CGI
- server - Is there any difference between apache2 and httpd? - Ask Ubuntu
- httpd - apache
- Apache HTTP Server - Wikipedia
- Virtual hosting - Wikipedia
- MX record - mail exchanger record
- Message transfer agent - MTA - Internet email system, a message transfer agent, or mail relay
Connection_Speed
- speed of light vs internet connections - Google Search
- Negotiation speed/duplex between a Gigabit ethernet switch or hub and NIC - Network Engineering Stack Exchange
- speed of wifi connection vs speed of light - Google Search
- speed of wireless connection vs wired - Google Search
- wireless connection vs wifi connection - Google Search
- How to Make Your Internet Faster with Privacy-Focused 1.1.1.1 DNS Service
- speed of light vs internet connections - Google Search
- speed of wifi connection vs speed of light - Google Search
- speed of wireless connection vs wired - Google Search
- Fix Your Slow Internet With These Networking Options
- squid : Optimising Web Delivery
- Why Changing DNS Settings Increases Your Internet Speed
- How To Hack DNS For Faster Internet Speed
- Changing your router's DNS settings to increase speed and security
- layer1 - Does bridging add delay? - Network Engineering Stack Exchange
- file.allitebooks.com/20151012/Guide to TCPIP, 4th Edition.pdf
- Port forwarding - Wikipedia
- router - What is port forwarding and what is it used for? - Super User
- Who provides the Internet service to Internet Service Providers (ISPs)? » TechWorm
- What is “link aggregation” and how does it benefit your network? | PC Gamer
- PRIVATRIX Monetizes Idle Bandwidth With New Peer-to-Peer Network – The Merkle
- Performance benchmark: nuster vs nginx vs varnish · jiangwenyuan/nuster Wiki · GitHub
- Everything You Need To Know About ARP: Address Resolution Protocol
- How Level 3's Tiny Error Shut Off the Internet for Parts of the US | WIRED
- Comcast Internet service crippled; affecting users across US
- Testing IPv6 Networking in KVM: Part 1 | Linux.com | The source for Linux information
- AT&T wants to bin 100,000 routers, replace them with white boxes • The Register
- The Wireless Age Completely Passed Them By - Funny & True Stories - Not Always Right Funny & True Stories – Not Always Right
- Cisco Training Courses: Prepare for CCNA, CCNP Networking Certifications
- A Visual Representation of Capsule Network Computations
- wireless connection vs wifi connection - Google Search
- Prepare for a Lucrative Career in Network Administration with This 9-Part Training
- Google Wants to Make the Internet Faster. Here’s How.
- What is a DNS server and should I use a custom one? | PC Gamer
- Create Multiple IP Addresses to One Single Network Interface
- The Greatest Computer Network You’ve Never Heard Of - Motherboard
- Prison Inmates Built PCs from e-Waste and Connected Online Using Prison Network
- What Every Webmaster Should Know About DNS - DZone Web Dev
- Telecommunications network - Wikipedia
- Getting started with software-defined networking | Opensource.com
- Basic Switch Configuration (2.1) > Cisco Networking Academy's Introduction to Basic Switching Concepts and Configuration
- Cisco Networking: Switch Interface Configuration
- List of router and firewall distributions - Operating systems - Wikipedia
Routers_firmware-Operating_Systems
- dd wrt - Is DD-WRT totally open source or just partially open source? - Super User
- DD-WRT vs. Tomato vs. OpenWrt: Which Router Firmware Is the Best? - Make Tech Easier
- DD-WRT Forum :: View topic - DDWRT is not a real open source
Resources
- Practical Networking .net – Networking presented simply, practically, and applicably
- Network Driver Interface Specification - NDIS - application programming interface (API) for network interface cards (NICs)
- Network socket - raw socket, nmap, ICMP ping
Troubleshooting
- Network configuration and trouble shooting commands in Linux - GeeksforGeeks
- Optical fiber - Wikipedia
- Power-line communication - PLC - aka power-line carrier, power-line digital subscriber line (PDSL), mains communication, power-line telecommunications, or power-line networking (PLN)
- networking - Is the MAC address needed outside of the LAN? LAN
- Packet switching - VS circuit switching
- Fast packet switching - Wikipedia
Embedded-Electronics-Internet_of_Things
Fundamentals
Electronics_Fundamentals
- PyroEDU - Electronics Courses For Everyone
- Learn About Electronics - Home Page
- Embedded system - real time OS - microkernel, exokernel - Monolithic kernels
- Top 7 Real Life Examples of Embedded Systems - TLists.com
- What is an embedded system? Can Mobile be considered as an embedded product? - Stack Overflow
- I’ve been looking around Google and want to know, technically speaking, what type of computer is a smart phone? Is it an embedded system? - Quora
- Is a Smartphone an Embedded System? « Barr Code
Projects
Smart_Homes
- How to build a smart home in an apartment | Android Central
SmartTv
Android_TV
- Running Android on a Raspberry Pi 3 - The MagPi MagazineThe MagPi Magazine
- Android Auto on Raspberry Pi: OpenAuto - The MagPi MagazineThe MagPi Magazine
- Android Auto on Raspberry Pi 3 – AndroidPub
- Android Pi Wiki | FANDOM powered by Wikia
- How to Install Android TV in Raspberry Pi 3 - Make Tech Easier
- android tv vs kodi on raspberry pi at DuckDuckGo
- osmc vs android on raspberry pi at DuckDuckGo
- How to Install Android on a Raspberry Pi
- 7 Amazing Android TV Tricks You Definitely Didn’t Know About
- What's the Best Browser for Android TV? 5 Top Apps, Ranked
- How to Make a Raspberry Pi Android TV Box
- Android Pie on Raspberry Pi 3B(+) with hardware acceleration - Raspberry Pi Forums
- Android on Raspberry Pi: How to run Google's popular OS - emteria.OS, Lineage OS, Android Things - Asus Tinker Board S
- Introducing the Raspberry Pi TV HAT - Raspberry Pi
Kodi
References
- Official Kodi Wiki
- Kodi (software) - Wikipedia
Platforms
OSMC
- Wiki - OSMC
Kodi_On_Raspbian
- kodi on raspbian at DuckDuckGo
- HOW-TO:Install Kodi on Raspberry Pi - Official Kodi Wiki
- Raspberry Pi Media Center: How to Install Kodi on Raspbian
- browser raspbian at DuckDuckGo
- firefox on raspbian at DuckDuckGo
- Raspbian vs. OSMC for Raspberry Pi - General Discussion - OSMC Forums
- Raspbian vs. OSMC for Raspberry Pi - General Discussion - OSMC Forums
- kodi raspbian vs osmc at DuckDuckGo
- kodi on raspberry zero performance at DuckDuckGo
Configuration
Performance
- real debrid at DuckDuckGo
Video_Formats_Codecs
- performance - Why does the Raspberry Pi need a MPEG-2 licence? - Raspberry Pi Stack Exchange
- codec - Why does a Raspberry Pi require a key to playback MPEG2 content? - Super User
- Difference Between MPEG2 and MPEG4 | Difference Between
Buffering_Issues_Fixes
- hd buffering kodi at DuckDuckGo
- raspberry pi codec and iptv at DuckDuckGo
- 2 Best Ways to Stop Buffering in Kodi Now - Kodi Tips
- How to stop Kodi buffering: The BEST fixes for a stable stream | Alphr
- Why Your Kodi Box Isn’t Working, and What to Use Instead
- kodi performance raspbian vs osmc at DuckDuckGo
- The Raspberry Pi Zero makes a great, super cheap Kodi box - Performance Aspect of Kodi on RPi Zero | Android Central
LiveTV
- Tvheadend - Official Kodi Wiki
- capter la tnt avec kodi at DuckDuckGo
- [Kodi/OpenELEC] Configuration des chaines IPTV avec Kodi | IT Tutorials
- Tutoriel TV/RADIO - ADSL/TNT sur Kodi
- pvr tv at DuckDuckGo
- Live TV and PVR/DVR Setup Guide - Official Kodi Wiki
- Free TV PVR (Personal Video Recorder) and TV Recording Software (thefreecountry.com)
- Raspberry Pi iptv setup? : IPTV
- iptv video format at DuckDuckGo
- IPTV - A simple explanation of Web TV (Internet television)
- How To Install Selfless IPTV Kodi Addon | WirelesSHack
- Les meilleures extensions/addons IPTV pour Kodi - Classement des Meilleurs VPN
- osmc azerty at DuckDuckGo
- How To Fix Check The Log For More Information Kodi Error | Easy Method
- How to Copy Kodi Profiles from one Device to Another?
- Raspberry Pi 3 B Plus - problème de démarrage (mire arc-en-ciel + éclair) - MCHobby - Le Blog
- Configuring Azerty Keyboard - lodkeys fr in /etc/local.rc
- Keyboard layout corresponding to set Region - loadkey fr in local.rc
Kodi_Addons
- COVENANT - No HD Sources or trouble streaming? FIX! - Kodi UK TV
vstream
- Installation de Vstream sur Kodi - hitechland
- VStream Kodi Installation
Addons_Development
- How Do Kodi Addons Work? Beginner's Guide to Content on Kodi
- 13 Kodi Repos You Need to Uninstall and Why
- Natively Watch Netflix on Raspberry Pi: the Detailed Guide
- How To Install Smith and Wesson Kodi Addon | WirelesSHack
- Mobdro for Kodi Download & Install Guide for XBMC - Mobdro Download App for PC, APK Android & iPhone Free
- Install KODI in ARABIC and IPTV guide - Husham.com
- ARABIC IPTV | Iptv2List.Com
Web_Browser
- webbrowser for kodi at DuckDuckGo
- Web browser released! - Raspberry Pi
- How to Use Google Chrome in Kodi to Access Your Streaming Services - Make Tech Easier
- Chrome Launcher Add-on: How to Browse The Web From Kodi
- Raspberry Pi - Official Kodi Wiki
- Using Kodi on the Raspberry Pi - Raspberry Pi Documentation
- The Only Raspberry Pi 3 Kodi Tutorial You Will Ever Need
- How to Customize Kodi with All the Bells and Whistles
- [Official] Kodi on Raspberry PI 3- How to install- Quick Steps
- Install Kodi to Turn Your Raspberry Pi Into a Home Media Center
- Controlling Kodi on the Raspberry Pi - Kodipiguide
- How Your Amazon Fire TV Stick and Kodi Could Cause Legal Issues
- Kodi 18 will have Google Assistant integration - Android Authority
- What Is Kodi? What Are Its Features? Is It Illegal? -- All Questions Answered
- New Kodi warning and this one may stop you using it FOREVER | Tech | Life & Style | Express.co.uk
- Best Kodi Forks For February 2018 - Top Kodi Alternatives
- kodi on amazon fire stick at DuckDuckGo
- How to Install Kodi on an Amazon Fire Stick - wikiHow
- How To Watch All Your Favorite Netflix Shows For Free
- 20 Kodi Keyboard Shortcuts Every Kodi User Should Know
- osmc vs kodi at DuckDuckGo
- kodi on arduino rather than pi at DuckDuckGo
- install osmc on arduino at DuckDuckGo
- What is Kodi? (Are You At Risk Using Kodi?) - Android Authority
- Accessing the command line - General - OSMC
- Internet Browser - General Discussion - OSMC Forums
- webbrowser osmc at DuckDuckGo
- ocelot browser osmc at DuckDuckGo
- Ocelot Browser for Online Video : OSMC
- kodi source too slow for continuous playback at DuckDuckGo
- subtitle autogeneration youtube kodi at DuckDuckGo
- The Best Ways to Remote Control Kodi From Your Couch
- How To Install Smith and Wesson Kodi Addon | WirelesSHack
Speech_To_Subtitle_Converter_Dispayer
- how does youtube subtitles autogeneration work at DuckDuckGo
- speech to subtitle converter arduino tv at DuckDuckGo
- speech to subtitle converter raspberry pi tv at DuckDuckGo
- speech to subtitle converter raspberry pi at DuckDuckGo
- speech to subtitle converter raspberry pi at DuckDuckGo
- speech to subtitle converter arduino at DuckDuckGo
- speech to subtitle converter arduino at DuckDuckGo
- Speech Recognition and Synthesis with Arduino - Arduino Project Hub
- Speech Recognition With Arduino
- An Arduino With Better Speech Recognition Than Siri | Hackaday
- How to write a program to convert speech to text for my Arduino project - Quora
- Voice to text translator raspberry pi - Stack Overflow
- build subtitle generator for tv speech at DuckDuckGo
- Can captions be generated automatically using speech recognition?
- Google relaunches voice recognition kit for Raspberry Pi
- build automatic subtitle displayer for tv at DuckDuckGo
- sd card - Can I do speech to text converting with arduino? - Arduino Stack Exchange
- Speech to Text - Build youtube-like automatic subtitle generator and displayer for tv - Raspberry Pi Stack Exchange
- turn tv into smart tv at DuckDuckGo
- How to transform any HDTV into a smart TV | PCWorld
- How to Get a Smart TV for Cheap With an HDTV
- Five of the best media-streaming boxes to turn your dumb TV into a smart one | Technology | The Guardian
- Make Any Dumb TV a Smart TV: 10 Steps
- The Raspberry Pi Home Theater: What You Can And Cannot Do
- The Easiest Raspberry Pi Media Centre, With RasPlex
- Mobdro — All the answers to your Mobdro questions
- How to Choose and Optimise Your Raspberry Pi Browser
- The 5 Best Raspberry Pi Smart TV Projects We've Seen
- Building your own green, open source home | Opensource.com
- 6 open hardware home improvement projects | Opensource.com
- Everything You Need To Set Up Raspberry Pi Home Automation
- SmartHomeBeginner - Smart Home, Media, Server, and Technology
- Steve's Home Networking and Home Automation Guide - resources
- So you're doing an IoT project. Cute. Let's start with the basics: Security • The Register
Smart_Cities
- Smart city implementation: Get it right the first time - IoT Agenda
Smart_Cars
- Upgrade your car with these 5 Arduino projects | Opensource.com
Car_Tracking_System
- RFID Tracking System | Hackaday
- Where is my car? Realtime GPS+GPRS Tracking of Vehicles using Arduino
- Use an Arduino to Build a Complete Multi-Station RFID Security Check System
- 1 - d77b9fde4d081e5b57273f8db77e478dfc2e.pdf
- (PDF) Radio Frequency Identification (RFID) Based Car Parking System
- Which RFID tags are best for vehicle tracking? - YouTube
- How To: Track Vehicles with RFID - RFID Insider
- How To: Track Vehicles with RFID
- Long Range UHF RFID Item Tracking System - Hackster.io
- RFID Vehicle Tracking System: Improve The Efficiancy - Corerfid
- RFID Vehicle Tracking Systems, Devices And Technology, RFID Australia
- Comparing Tracker Technologies (GPS, vs RFID vs Bluetooth vs Wi-Fi)
- Fire alarm in JavaScript - CodeProject
- Manage a Fleet of Drones - Hackster.io
- How to build a raspberry pi cluster server - Coding Security
- Make a DIY wall display with an old monitor and Raspberry Pi - CNET
- How to Make Your Own Smart Speaker
- How To Make A Pocket-sized DIY Linux Computer?
- Autonomous Vehicle and Remote Surveillance with the Intel® Edison Platform - CodeProject
- 10 Raspberry Pi creations that show how amazing the tiny PC can be | Ars Technica
- Top 10 Raspberry Pi Zero Projects That Make Use of Its Small Stature
- Raspberry Pi and Arduino Laptop - Hackster.io
- How to Make an Ultrasonic Range Finder Using an LCD and Arduino
- Simple Arduino web server with ethernet shield - CodeProject
- WebApp Controlled Gate Operator Add-on (IoT): 20 Steps (with Pictures)
- GitHub - ThingEngineer/IoT-Gate-Operator-Addon: IoT Gate Operator Addon with web app based on the electric imp
- Twenty IoT Builds That Just Won $1000 in the Hackaday Prize | Hackaday
- IoT Water Alarm: 5 Steps (with Pictures)
- 750 Raspberry Pis Turned Into Supercomputer for Los Alamos National Laboratory - ExtremeTech
- Learn how to make a Raspberry Pi alerting machine | Opensource.com
- Zigbee-Based Wireless Arduinos, Demystified | Hackaday
- Arduino Saves Gameboy Camera | Hackaday
- How to create an Internet-in-a-Box on a Raspberry Pi | Opensource.com
- Turn your old Raspberry Pi into an automatic backup server | Opensource.com
- How you can build your own VR headset for $100 – freeCodeCamp
- NO Fuss Micro:bit Temperature Monitor - Hackster.io
- GitHub - mpentler/teletext-twitter: Reads your Twitter timeline and turns it into teletext pages for your Raspberry Pi
- opensource.com/article/17/3/pi-display-dashboard?sc_cid=70160000001273HAAQ
- https://opensource.com/article/18/2/block-ads-raspberry-pi?utm_campaign=intrel
- IoT Doorman: Eye-Controlled Door for a Girl with Cerebral Palsy | Hackaday
- Real-time Face Recognition: an End-to-end Project: 8 Steps (with Pictures)
- This Motion-Detecting Wildlife Camera Was Made with Raspberry Pi
- Turn a Raspberry Pi into a Personal VPN for Secure Browsing Anywhere You Go
- Raspberry Pi VPN Access Point: Setup a Basic VPN Router - Pi My Life Up
- Raspberry Pi Steam Box: Stream PC Games to the Pi - Pi My Life Up
- 10 Cool Raspberry Pi + Windows 10 IoT Core Projects
- How to build a Raspberry Pi wireless access point | PC Gamer
Platforms
Platforms_comparison
- intel nuc vs raspberry pi at DuckDuckGo
- Watch out, Raspberry Pi: Intel unveils ultra-small Next Unit of Computing PC - ExtremeTech
- What's in between a Raspberry Pi 2 and an Intel NUC? - htpc
- TI LaunchPad or Arduino for first microcontroller? - arduino
- Which is better for beginners, MSP 430 Launchpad or Arduino Uno? - Quora
- Is TM4C123 similar to Arduino? - Arduino Stack Exchange
- Arduino: Building LED and Espionage Projects - Google Search
- Arduino Wearable Projects - Google Search
- Arduino Android Blueprints - Google Search
- Internet of Things with Arduino Blueprints - Google Search
- mbed robotics - Google Search
- mbed vs arduino - Google Search
- arm sandboxing wiki - Google Search
- Arduino: Building LED and Espionage Projects - Google Search
- Arduino Wearable Projects - Google Search
- Arduino Android Blueprints - Google Search
- Internet of Things with Arduino Blueprints - Google Search
- mbed robotics - Google Search
- mbed vs arduino - Google Search
- mbed os - Google Search
- arm sandboxing wiki - Google Search
- fpga vs arduino - Google Search
- beaglebone black vs raspberry pi - Google Search
- raspberry pi vs arduino - Google Search
- beaglebone Black vs beagleboard - Google Search
- Atmel AVR - Wikipedia
- Raspberry Pi's latest competitor RockPro64 brings more power plus AI processor | ZDNet
- Arduino VS Raspberry which is Best Computer?
- The ASUS Tinker Board is a compelling upgrade from a Raspberry Pi 3 B+ | Jeff Geerling
- stm vs arduino at DuckDuckGo
- smartphone vs raspberry pi performance - Google Search
- But aren't smart phones more powerful than a Raspberry Pi? : raspberry_pi
- aaeon vs raspberry - Google Search
- 5 Raspberry Pi Alternatives You Need to Know About - Banana Pi
- avr vs arm - Google Search
RaspberryPi
References
- The Raspberry Pi Beginner's Guide is out now (and it's huge!) - Raspberry Pi
- Raspberry Pi guide - The MagPi MagazineThe MagPi Magazine
- Raspberry Pi - Teach, Learn, and Make with Raspberry Pi
- Top 10 Raspberry Pi blogs to follow | Opensource.com
- Raspberry Pi: The Unofficial Tutorial
RapsberryPi_Zero
- Raspberry Pi Zero - Raspberry Pi
- Zero WH: pre-soldered headers and what to do with them - Raspberry Pi
Models_comparison
- tiva c launchpad vs arduino at DuckDuckGo
- The Raspberry Pi 3 B+ is here with a Range of Awesome Improvements
- Raspberry Pi 3 vs Pi 2: What's the difference? | Trusted Reviews
- raspberry pi 3b+ vs zero at DuckDuckGo
Codecs_Licensing
- How to Add MPEG-2 and VC-1 Video Codec Support to Your Raspberry Pi
Accessories
- Raspberry Pi TV HAT - Raspberry Pi
- shutdown switch raspberry pi at DuckDuckGo
- Easily Add a Shutdown Switch to a Raspberry Pi
- RaspberryPi SD cards compatibility - eLinux.org
- A beginner’s guide to Raspberry Pi 3 | InfoWorld
- Overclock your Raspberry Pi 3: The Utimate Guide
- 5 easy steps to getting started using Raspberry Pi | iMore
- What is the Raspberry Pi 3? Everything you need to know about the tiny, low-cost computer | ZDNet
- No coding required: Node-RED on a Raspberry Pi | Opensource.com
- How to Boot Multiple Operating Systems on the Raspberry Pi with BerryBoot « Null Byte :: WonderHowTo
- is raspberry pi an embedded system - Google Search
- is raspberry pi an embedded system or a computer - Google Search
- what is raspberry pi zero - Google Search
- Google is making a computer vision kit for Raspberry Pi - The Verge
- PiTunnel connects your Raspberry Pi to the world | TechCrunch
- How to Use VNC to Remotely Access Your Raspberry Pi from Other Devices « Null Byte :: WonderHowTo
- Kali Linux 2017.3 hands-on: The best alternative to Raspbian for your Raspberry Pi | ZDNet
- techrepublic.com/article/want-to-set-up-a-network-of-raspberry-pi-computers-heres-how-to-do-it/
- Easily Compiling OpenCV in Raspberry PI - Hackster.io
- Roll Your Own Raspberry Pi OS | Hackaday
- Firing up 750 Raspberry Pis | Hackaday
- How to set up your Raspberry Pi without a keyboard, monitor, or mouse - howchoo
- How to Setup a Raspberry Pi Without a Monitor or Keyboard
- Use your desktop or laptop screen and keyboard with your Pi - Raspberry Pi
- why raspberry pi need mpeg license at DuckDuckGo
- Why do I have to buy the MPEG2 Codec License? : raspberry_pi
- Does A Raspberry Pi Really Need Heat Sinks? : raspberry_pi
- How to Overclock OpenELEC on the Raspberry Pi | Average Maker
- Overclocking Raspberry Pi: How to Do It and What You Need to Know
- Is a case with a fan necessary? : RetroPie
- Is a fan needed for a Pi 3? : raspberry_pi
- Best Raspberry Pi Heatsink - Keep Your Device Cool
- What you need to know about overclocking Raspberry Pi
- 6 Lightweight Operating Systems for Your Raspberry Pi
- Understanding RaspberryPi Boot Process - BeyondLogic
- Chromium Embedded Framework CEF on the Raspberry Pi - Hardware Accelaration
- pi 3 - what are the limitations of Google's official Android Thing port for Pi3? - Raspberry Pi Stack Exchange
Raspberri_Boot_Process
- Raspberry Pi 4 boot EEPROM - start.elf, bootcode.bin, recovery.bin,
- GitHub - raspberrypi/firmware: This repository contains pre-compiled binaries of the current Raspberry Pi kernel and modules, userspace libraries, and bootloader/GPU firmware.
- Boot options in config.txt - Raspberry Pi Documentation
- The boot folder - boot partition contents - definitive list - dtb Device Tree Blob files - bootcode.bin, start.elf - EEPROM
- arm - How does Raspberry Pi's boot loader work? - boot process
Arduino
- ISM Communications for Arduino | Hackaday
- Spot Welder 1-2-3 Arduino Firmware
- Hardware Abstraction Layer in Arduino
- There's a mini-RTOS in my language - The AdaCore Blog
- GitHub - travisgoodspeed/md380tools: Python tools and patched firmware for the TYT-MD380
- Cypress PSoC et l'EDI PSoC Creator
- NanoPi K1 Plus: A $35 Raspberry Pi clone with Gigabit Ethernet, 2x RAM, stronger GPU - TechRepublic
- Single Board Computers, Embedded Board, Industrial PC, IPC - AAEON
Embedded_Systems
Embedded_code-Bare_metal_programming
Firmwares_Development
- Das U-Boot - the Universal Boot Loader, often shortened to U-Boot - first and second stage bootloader - loaded by the system's ROM or BIOS from a supported boot device, such as an SD card, SATA drive, NOR flash (e.g. using SPI or I²C) - SPL (Secondary Program Loader) - device tree
- WebHome < ELDK-5 < DENX
- Firmcodes - firmware development, IoT embedded systems
Programmable_Logic_Controllers
- Programmable logic controller - SCADA
- VHDL - Wikipedia
- ARM Programming with Bare C | Hackaday
- Efficient C Tips #10 – Use unsigned integers « Stack Overflow
- Using Modern C++ Techniques with Arduino | Hackaday
- micropython - Google Search
- Toolchain - OsmocomBB - Open Source Mobile Communications
- Embedded C - Wikipedia
- double buffer real time programming at DuckDuckGo
- flip flop real time - Google Search
- mutex performance real time - Google Search
- mutexes in embedded system at DuckDuckGo
- sequence diagram real time programming at DuckDuckGo
- exception handling in realtime environment at DuckDuckGo
- try catch performance c++ at DuckDuckGo
- c - For embedded code, why should I use "uint_t" types instead of "unsigned int"? - Electrical Engineering Stack Exchange
- A Hacker's Guide to Programming Microcontrollers - definitive intro « Null Byte :: WonderHowTo
- Is it possible to run program without operating system (e.g boot the computer from a flash drive)? - Quora
- kernel - How do operating systems… run… without having an OS to run in? BIOS code stored in CMOS setting - How does BIOS read boot sector
- Motherboard Chipsets and the Memory Map | Many But Finite
- operating systems - Would an executable need an OS kernel to run? - standalone program
- operating system - Can I execute any c made prog without any os platform? - Stack Overflow
- How do I write a simple bare-metal program? - CPU boot up
- Embedded c - how to free allocated memory when a program crashes - Stack Overflow
- Bare Metal Programming in C Part 1 - Cross-Compiling Raspberry Pi, Compiler/Linker - bOOT pROCESS
- [C++Embedded] The biggest problem with using C++ in embedded systems: dynamic memory allocation in the STL
- operating systems - Is memory allocation hardware handled or OS? - Software Engineering Stack Exchange
- c - When does malloc return NULL in a bare-metal environment? - brk, sbrk - stack/heap collision - embedded systems
- Introduction · Practical Guide to Bare Metal C++ - definitive ebook - Dynamic Memory Allocation - UART, Timer, GPIO, I2C, SPI - data serialization - device driver development - RTTI
- Bare metal malloc - dynamic memory allocation - MMU dependance
- GitHub - rsta2/circle: A C++ bare metal environment for Raspberry Pi with USB (32 and 64 bit) - malloc implementation embedded system
- GitHub - embeddedartistry/libmemory: Embedded systems memory management library. Implementations for malloc(), free(), and other useful memory management functions
- library - C standard libraries on bare metal - Electrical Engineering Stack Exchange
- Implementing Malloc: First-fit Free List — Embedded Artistry
- Why is malloc() harmful in embedded systems? memory fragmentation
- programming - Is using malloc() and free() a really bad idea on Arduino? - embedded system/code - optimization - SRAM, EEPROM - Halting Problem
- anti patterns - Embedded systems worst practices? - Stack Overflow
- hardware - Is low-level / embedded systems programming hard for software developers? - Stack Overflow
- Simply Embedded – Embedded systems from the board up
- real time farlabs at DuckDuckGo
- rtx operating system at DuckDuckGo
- How to calibrate touch screens | Embedded
- From zero to main(): Bare metal C - Definitive Introduction - Startup before main function - Interrupts, Reset_Handlers, SystemInit - OpenOCD Arduino fork - ARMv6-M - libc, __main
- Standalone program - freestanding - bare metal - SoC microcontrollers, embedded systems, processors - security attack surface - vs Operating system complexity
- Bare machine computing - Wikipedia
- Bare machine - embedded systems, firmwares
- definitive - How to run a program without an operating system? - bare metal - raspberry pi - boot sector, MBR - bootloader - GRUB multiboot - QEMU
Industrial_Internet_of_Things
- iot vs iiot - Google Search
- PLCnext Controller AXC F 2152
- PLCnext Technology · GitHub
- PLCnext Technology – the Platform for limitless automation - PHOENIX CONTACT
IoT_and_Cloud_relationship
Azure_Event
- Azure Red Shirt Dev Tour NYC 2017 | Part 1 - YouTube
- MXCHIP Microsoft Azure IoT Developer Kit - Google Search
- The cloud and the Internet of things are inseparable | InfoWorld
- The relationship between IoT and cloud computing - Quora
- The Role of Cloud in the Internet of Things - IoT
- The cloud and the Internet of things are inseparable | IoT
Recylcling_old_hardwares
- what to do with an old laptop - Google Search
- How to create a NAS from your old PC and Why you need one
- Give old electronics new life with Linux and Raspberry Pi | Opensource.com
Refs
- Embedded Gurus – Experts on Embedded Software
- Dangerous Prototypes - Open Source Hardware Projects
- Embedded Linux Wiki
- iFixit: The Free Repair Manual - Hardware hacking - Repair - Fix
- mbedded.ninja - embedded systems engineering
- Proejct Introduction · Embedded Linux Wiki - firmware security resources, boot, real time - elinux.com
- Embedded systems, IoT - i.MXDev Blog
- Device Tree Tutorial (ARM) – dts, dtb - Flattened Device Tree - ATAGS - linux kernel
- The Three Phases of the IoT Revolution and the Resources Developers Need to Get Started - CodeProject
- Phone-Chip Designer Tackles 'Industrial' Internet of Things
- Here's why IoT testing is really going to matter to QA pros
- Arduino Blog » DIY vending machine with Arduino
- Azure IoT Edge brings smarts to devices at the cloud’s edge
- UK government issues advice on what makes 'Kodi boxes’ illegal
- Massena Gets Super Fast Fiber Optic Network
- Exclusive: Lockheed Skunk Works' X-44A Flying-Wing Drone Revealed - The Drive
- Flash your Libre Firmware with a Libre Programmer | Hackaday
- Security - overview
Artificial_Intelligence
AI_Dangers_Concerns
- Human-level AI could be achieved "within five to ten years", say experts
- UC Berkeley professor's eerie lethal drone video goes viral
- The United Nations Met to Discuss a Possible Ban on "Killer Robots"
- The 'creepy Facebook AI' story that captivated the media - BBC News
- Kasparov: 'Embrace' the AI revolution - BBC News
- IBM Is Clueless About AI Risks
- This backflipping noodle has a lot to teach us about AI safety - The Verge
- The Day Humans Taught Robots to Fight Back
- A.I. will be 'billions of times' smarter than humans, man and machine need to merge
- Watch a Human Try to Fight Off Boston Dynamics' Door-Opening Robot Dog | WIRED
- Steve Wozniak doesn't agree with Elon Musk, Stephen Hawking on A.I.
- Elon Musk responds to Harvard professor Steven Pinker’s A.I. comments
- What Defines Artificial Intelligence? The Complete WIRED Guide
AI_Programming
AI_Programming_Projects
Buiding_AI_Engines
- Test Driven Chess Artificial Intelligence - CodeProject
- Number recognition with MLP Neural Network - CodeProject
- How to Build DIY AI Projects Using Google TensorFlow and Raspberry Pi
- State of Voice Coding — 2017 – bambuu – Medium
- 16 free E-books to kickstart your Artificial Intelligence programming - Coding Security
Robotics
Robot_Building_Projects
- Top 10 Kickass Arduino Projects
- Robotics simulator - Wikipedia
- Actin (software) - Wikipedia
- OpenNI - Wikipedia
- Point Cloud Library - Wikipedia
- Arduino Blog » ASPIR is a full-size, Arduino-powered humanoid robot
- Getting started with open source robotics | Opensource.com
- best arduino robot project at DuckDuckGo
Robot_Operating_System
- gtest - ROS Wiki
- Robot Operating System - Wikipedia
- fffaraz/awesome-cpp: A curated list of awesome C/C++ frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
- Robotics Programming Tutorial: How to Program a Simple Robot | Toptal
- Killer robots: Experts warn of 'third revolution in warfare' - BBC News
- US firm reveals gun-toting drone that can fire in mid-air - BBC News
- RightHand robotics has automated a new type of warehouse work that could help Amazon (AMZN) — Quartz
- Boston Dynamics' SpotMini robot dog looked right at us, and it was downright creepy
- Modular Robotics Made Easier With ROS | Hackaday
- How to train your robot: Research provides new approaches
- Off-line programming (robotics) - Wikipedia
- Outline of robotics - Wikipedia
- Watch Boston Dynamics' Humanoid Robot Do Parkour
Machine_Learning
Data_Clustering
- Beginning data clustering - CodeProject
- The Unreasonable Ineffectiveness of Machine Learning in Computer Systems Research | SIGARCH
- A bot lingua franca does not exist: Your machine-learning options for walking the talk • The Register
- computer vision vs machine learning - Google Search
- Google’s DeepMind achieves machine learning breakthroughs at a terrifying pace
- Google's AI can create better machine-learning code than the researchers who made it
- Introduction to Machine Learning - CodeProject
- The best resumes will soon have “skilled in machine learning” instead of “proficient in Excel” — Quartz
- Learning with light: New system allows optical 'deep learning'
- How Retailers Use Latest Techniques from Machine Learning - CodeProject
- BigDL – Scale-out Deep Learning on Apache Spark Cluster - CodeProject
- Transfer Learning Using Neon - CodeProject
- Distributed, Docker-ized Deep Learning with Intel® Nervana™ technology, neon, and Pachyderm - CodeProject
- Intel® MKL-DNN: Part 1 – Library Overview and Installation - CodeProject
- Intel® MKL-DNN: Part 2 – Sample Code Build and Walkthrough - CodeProject
- The Limits of Artificial Intelligence and Deep Learning | WIRED
Speech_Recognition
- Use google speech recognition in your app using python - Coding Security
Computer_Vision
- [1803.05268] Transparency by Design: Closing the Gap Between Performance and Interpretability in Visual Reasoning
- Artificial intelligence system uses transparent, human-like reasoning to solve problems | MIT News
- A Year in Computer Vision
- Can Technology Replace The Eye? - CodeProject
- Beyond Machine Sight — Real Life
- Barcode and QR code Scanner using ZBar and OpenCV | Learn OpenCV
Face_Recognition
- Making your own Face Recognition System – freeCodeCamp
- Open source image recognition with Luminoth | Opensource.com
Business-Wise
- How NASA's A.I. moonshots idea could help your enterprise | Computerworld
Resources
- Finnish university's online AI course is open to everyone
- artificial intelligence gmail - Google Search
- Google’s latest AI experiment lets software autocomplete your doodles - The Verge
- OpenAI’s new system lets you train robots entirely in VR
- Google’s Artificial-Intelligence Wizard Unveils a New Twist on Neural Networks | WIRED
- 10 Top Open Source Artificial Intelligence Tools for Linux
- Microsoft Wants to Use AI and Machine Learning to Discover a Cure for Cancer
- Meet the tech company that wants to make you even more addicted to your phone | TechCrunch
- artificial intelligence gmail - Google Search
- Gmail can use Google's AI to write replies for you
- The Dark Secret at the Heart of AI - MIT Technology Review
- How to Get Started as a Developer in AI - CodeProject
- How to get started with AI(Artificial Intelligence) - Coding Security
- World's Leading Physicist Says Quantum Computers Are "Tools of Destruction, Not Creation"
- Google's Artificial Intelligence Builds Its Own AI 'Child'
- AI's brightest minds are still figuring out how to understand their creations — Quartz
- AI is the next phase of human evolution
- Counterfeiters are using AI and machine learning to make better fakes
- World power 'threatened' by Chinese AI - BBC News
- Facebook's AI wipes terrorism-related posts - BBC News
- How a Neural Network Learns to Talk in 14 Minutes [Video] - TechAcute
- Artificial Intelligence Will Make Forging Anything Entirely Too Easy | WIRED
- Scaling to Meet the Growing Needs of AI - CodeProject
- Microsoft makes three more cognitive services generally available | ZDNet
- What do made-for-AI processors really do?
- This 'Mind-Reading AI' Can Draw Images Of What You're Thinking
- hackread.com/ai-powered-search-engine-ella-security-footage/
- Mysterious 15th century manuscript decoded by computer scientists using artificial intelligence | The Independent
- Artificial Intelligence: The Complete Guide | WIRED
- Google will teach you about AI and machine learning for free
- ai-machine-learning-cybersecurity
Quantum_Computing
Computing_Models_Comparison
- Researchers Finally Proved Quantum Computers are More Powerful Than Classical Computers - Motherboard
- IBM finally proves that quantum systems are faster than classicals
- The Ongoing Battle Between Quantum and Classical Computers
- Simple Math Problem Shows Quantum Computing Is Better Than Your PC | Digital Trends
- Teenager Finds Classical Alternative to Quantum Recommendation Algorithm | Quanta Magazine
Basics
- Top 3 Quantum Myths and Misconceptions – Quantum Bits – Medium
- Quantum logic gate - Wikipedia
- Quantum computing - Wikipedia
- Quantum Computing | Centre for Quantum Computation and Communication Technology
- Quantum Mechanics for Scientists and Engineers | Stanford Lagunita
- What Exactly Is Quantum Computing?
- Here's what quantum computing is and why it matters
- Is quantum computing just pie in the sky? - Quantum Computing Stack Exchange
- Five ways quantum computing will change the way we think about computing
- Quantum Computing Is Coming for Your Data | WIRED
- The Era of Quantum Computing Is Here. Outlook: Cloudy | Quanta Magazine
- Check out these 5 wild and wacky quantum computer facts for cool people
- science Finally, a Problem Only Quantum Computers Will Ever Be Able to Solve Author: Kevin HartnettKevin Hartnett
- What are quantum computers and how do they work? WIRED explains | WIRED UK
- What Is Quantum Computing? The Complete WIRED Guide
- Timeline of quantum computing - Wikipedia
- Qubit - vs bit
Quantum_Algorithmics
- Developing quantum algorithms for optimization problems
- Quantum Algorithm Zoo
- Quantum Computers Struggle Against Classical Algorithms | Quanta Magazine
- [1807.04271] A quantum-inspired classical algorithm for recommendation systems
Quantum_Programming
- How to program a quantum computer – Dr James Wootton – Medium
- Microsoft’s new coding language is made for quantum computers
- How Do You Code for a Quantum Computer? | Inverse
- Microsoft Provides Free Lessons for Quantum Computing Programming | Digital Trends
- Microsoft’s Quantum Programming Language, Q#, Could Help You Learn Quantum Physics | Digital Trends
- How to write a quantum program in 10 lines of code (for beginners)
Microsoft_QSharp-Quantum_Development_Kit
- Quantum computing | Microsoft
- Quantum Development Kit | Microsoft
- Setting up the Q# development environment | Microsoft Docs
- How to program a quantum computer – Qiskit – Medium
Resources
- Quantum information references | Microsoft Docs
- resource request - Is my background sufficient to start Quantum Computing - Q#
- Home Page For Umesh Vazirani - quantum academic resources and papers
- Quantiki | Quantum Information Portal and Wiki - Quantum Computing Resources
- Are there emulators for quantum computers? definitive list of quantum processor emulator - resources
- GitHub - rigetti/pyquil: A Python library for quantum programming using Quil. open source quantum programming library in Python. The documentation includes a hands on introduction to quantum computing where you learn by programming - Q# alternative - resource - tool
- GitHub - ebraminio/awesome-qsharp: A curated list of Q# code and resources - quantum computing
- Programming quantum computers for non-physics majors - PyQuil - resources
- What programming languages are available for quantum computers? Q# - PyQuil
- There's a Massive Issue in Quantum Computing That No One Talks About, And We Just Got Closer to Overcoming It
- Deterministic teleportation of a quantum gate between two logical qubits | Nature
- Running quantum algorithms in the cloud just got a lot faster - MIT Technology Review
- The World’s First Practical Quantum Computer May Be Just Five Years Away
- Researchers 'teleport' a quantum gate
- So, when can I play video games on my quantum computer?
- How Fast Can Quantum Computers Get?
- Two-qubit chip draws quantum computing closer | Cosmos
- Quantum annealing - Wikipedia
- D-Wave Systems - Wikipedia
- quantum annealing at DuckDuckGo
- What’s the difference between quantum annealing and universal gate quantum computers?
- does Intel invest in Quantum processing - Google Search
- Google’s Quantum Computing Push Opens New Front in Cloud Battle - Bloomberg
- BREAKING: Engineers just unveiled the first-ever design of a complete quantum computer chip
- Is Quantum Computing an Existential Threat to Blockchain Technology?
- does Intel invest in Quantum processing - Google Search
- Scientists pinpoint the singularity for quantum computers
- Blind quantum computing for everyone
- Corkscrew light beams could lead to practical quantum computers
- A new kind of quantum computer
- Quantum Supremacy Is Only Months Away, Says Google Team
- Physicists Want to Rebuild Quantum Theory From Scratch | WIRED
- Researchers Just Achieved One of the Major Requirements for Quantum Computing
- Scientists Build a 51-Qubit Quantum Simulator and It's the Largest One Yet
- A New Breakthrough in Quantum Computing is Set to Transform Our World
- MIT Researchers Just Got One Huge Step Closer to a Quantum Computer | Inverse
- When Will Quantum Computers Be Consumer Products?
- New Quantum Technology Lets You Use Your Phone to Identify Counterfeit Goods
- Record-breaking 45-qubit quantum computing simulation run at NERSC
- IBM makes 20 qubit quantum computing machine available as a cloud service | TechCrunch
- Microsoft's cool quantum computing plan embraces cryogenic memory | PCWorld
- IBM Just Made a 17 Qubit Quantum Processor, Its Most Powerful One Yet - Motherboard
- engadget.com/2018/01/09/this-is-what-a-50-qubit-quantum-computer-looks-like/#ampshare=https://www.engadget.com/2018/01/09/this-is-what-a-50-qubit-quantum-computer-looks-like/
- Quantum Weirdness in Your Browser | Hackaday
- New form of qubit control may yield longer computation times | Ars Technica
- Why Quantum Computers Will Be an Amazing Tool for Social Innovators
- Why JP Morgan, Daimler Are Testing Quantum Computers That Aren't Useful Yet | WIRED
- How One Quantum Particle Can Send Messages to Itself
- Quantum Communications in Your Browser | Hackaday
- Here's why 100 qubit quantum computers could change everything
- Gil Kalai’s Argument Against Quantum Computers | Quanta Magazine
- Job One for Quantum Computers: Boost Artificial Intelligence | Quanta Magazine
- Google thinks it’s close to “quantum supremacy.” Here’s what that really means. - MIT Technology Review
- Une puce quantique photonique de 49 qubits et une nouvelle solution pour booster la puissance des systèmes de calcul quantique analogiques
- Quantum Computing For Computer Scientists | Hackaday
- Tuning into quantum: Scientists unlock signal frequency control of precision atom qubits
- Pentagon sees quantum computing as key weapon for war in space - SpaceNews.com
- Researchers prove the arrow of time is irrelevant to quantum computers
- Wandering Bose-Einstein condensate may lead to scalable quantum computer – Ars Technica
- Why we should be afraid of quantum computing | VentureBeat
Ressources_Administration
- 10 Essential Spark Interview Questions and Answers
- 3 open source log aggregation tools | Opensource.com
Virtualization
- how does rfb protocol work at DuckDuckGo
- how does rdp work at DuckDuckGo
- kvm vs vmware at DuckDuckGo
- Difference between KVM and QEMU - Server Fault
- Automated provisioning in Kubernetes | Opensource.com
- Learning Docker Networking — Part 1 – Hacker Noon
- Funtainers: The Beauty of Running Containers as Functions - The New Stack
- How to Extract Content from VMDK Files
- How does a Hypervisor work? - Quora
- Getting started with Vagrant | Opensource.com
- Managing virtual environments with Vagrant | Opensource.com
- vagrant vs chef at DuckDuckGo
- The Top 5 Enterprise Type 1 Hypervisors You Must Know
- ESXi Free vs Paid - What are the differences? | ESX Virtualization
- kvm vs esxi - homelab
- Which is better for virtualization - VMware or VirtualBox? - Quora
- OSBoxes - Virtual Machines for VirtualBox & VMware
- VirtualBox - Debian Wiki - linux config
- VirtualBox networking explained - Networking modes - internal vs bridged vs Nat vs host only - security considerations
- Chapter 6. Virtual Networking - NAT service, port forwarding - Bridged mode, ARP, MAC - promiscuous mode - wireless adapters
- Virtualbox Bridged Networking Mode Allows VM to Connect to Your Router - LinuxBabe
- The Catling Mindswipe: How-to: VirtualBox Networking Part Two - NAT and Bridged
- virtualbox - How to allow other computers on the network to access my virtual web server? LAN to VM - bridged networking, NAT Service/Network port forwarding
- Oracle VM VirtualBox: Networking options and how-to manage them | definitive breakdow NAT vs Bridged vs Internal vs Host-only vs NAT - Port forwarding configuration
- Oracle VM VirtualBox Network Configuration Options - definitive comparison NAT vs Bridged vs Internal vs Host-only vs Generic - Port Forwarding
- DEFINITIVE - VirtualBox Network Settings: All You Need to Know - NAT vs NAT network vs Bridged adapter vs Internal vs Host-only vs Generic driver - Port forwarding examples and configuration - Promiscuous mode - Bridging for wireless adapters
- virtualbox.org • View topic - What does "Cable connected" checkbox change?
- DEFINITIVE - How to Install Ubuntu on VirtualBox as a VM: Complete Walkthrough - VBoxLinuxAdditions.run - guest additions
- How does bridged networking work in Virtualbox? - MAC Address, Sniffing, IP Address Spoofing - vs Multihoming -definitive breakdown
- Chapter 4. Guest Additions
Cloud
Certifications
- Amazon, Google, and Microsoft Aren't the Only Cloud Innovators Around
- do vs aws - Google Search
- Cloud_issues-Centralized_network_bottlenecks-P2P_and_decentralized_networks_advantages
- The Role of Cloud Tech in AI and IoTWeb Hosting Blog by bodHOST
- 'Lambda and serverless is one of the worst forms of proprietary lock-in we've ever seen in the history of humanity' • The Register
- Microsoft Runs a Simulation of the Entire Azure Network to Prevent Out
- Pluralsight | Microsoft Azure
- ovh vs aws - Google Search
- Make your Cloud with Subutai - Hakin9 - IT Security Magazine
- Amazon launches AWS Secret Region
- Brief Introduction of Data Center Technologies - CodeProject
- Creating Serverless Functions with Python and AWS Lambda
- Serverless but not stress-free: enterprise computing moves outside the enterprise | ZDNet
- What is the difference between SaaS, PaaS and IaaS with real life examples? - Quora
Storage_Strategies
- Getting started with openmediavault: A home NAS solution | Opensource.com
- Complete Guide to Setup a Network Attached Storage
- Host your own cloud with Raspberry Pi NAS | Opensource.com
- Network-attached storage - Wikipedia
- Storage area network - Wikipedia
- nas vs san at DuckDuckGo
- How to build a Raspberry Pi-powered NAS | Windows Central
Annuary_Services-LDAP
Active_Directory
- Introducing: Detection Lab – Chris Long – Medium
- 10 open source tools for your sysadmin toolbox | Opensource.com
- Revisiting wallabag, an open source alternative to Instapaper | Opensource.com
Data_Sciences-Big_Data
Knowledge_Management_Systems-Local_Search_Engines
- Is there a file local search engine like "Everything" in Linux? rlocate- Unix & Linux Stack Exchange
- Prograstinator: Nutch + Solr for a local filesystem search engine - local search engine, knowledge management system
- Apache Nutch - open source web crawler - Wikipedia
- Full-text search - text retrieval - Wikipedia
- Elasticsearch - distributed, multitenant-capable full-text search engine with an HTTP web interface and schema-free JSON documents - powered by Lucene - Wikipedia
- List of information retrieval libraries - Lemur - Lucene - Solr - Elasticsearch - Manatee - Sonic - Sphinx - Tantivy - Toshi - Terrier Search Engine - Xapian - Wikipedia
- Elasticsearch vs. Solr - Choosing Your Open Source Search Engine
- Apache Solr vs Elasticsearch - the Feature Smackdown!
- Elasticsearch Reference - Elastic
- Solr vs. Elasticsearch: Who’s The Leading Open Source Search Engine? | Logz.io
- How to develop a simple local search engine for full text search in local files - Stack Overflow
- Web scraping -web harvesting, or web data extraction is data scraping used for extracting data from websites - Wikipedia
- Search engine indexing - Indexer - Wikipedia
- IntranetDocumentSearch - Nutch / Solr - local search engine - Nutch Wiki
- Data Mining - Course - Autumn 2005
- Four Sentiment Analysis Accuracy Challenges in NLP | Toptal
- InUse - What if machines could talk ? - SaaS application by OptimData
- How to set up a database if you’re a front-end developer
- Enhancing Outlier Detection with Intel® Data Analytics Acceleration Library - CodeProject
- 30-minute Python Web Scraper – Hacker Noon
- hadoop at DuckDuckGo
Cryptocurrency-Blockchains
- Crypto Industry on ‘Brink of an Implosion,’ Researcher Says - Bloomberg
- Bitcoin : l'industrie de la cryptomonnaie est au bord de l'implosion en raison d'un déclin graduel du volume de transaction, selon une étude
Resources
- Blockchain community - Blockgeeks
- Bitcoin Wiki - reference documentation
Technical_Foundations
Blockchains
- Why does the blockchain need blocks? - Bitcoin Stack Exchange
- Why do we need blockchains? - Bitcoin Stack Exchange
- Home | Bitcoin Block Explorer
- Difference between transaction chain vs blockchain - Bitcoin Stack Exchange
- The Big Legal Issue Blockchain Developers Rarely Discuss - CoinDesk
- (W39M00) Blockchain - Introduction - Hakin9 - IT Security Magazine
- How blockchain can complement open source | Opensource.com
- How to Build Your Own Blockchain Part 1 — Creating, Storing, Syncing, Displaying, Mining, and Proving Work - PoW Proof Of Work, PoS Proof Of Stake
- How blockchain will influence open source | Opensource.com
- How blockchain will reduce the cost of running an open organization | Opensource.com
- Don't Use a Blockchain Unless You Really Need One - CoinDesk
- What Does Cryptocurrency Have to Do With Blockchain Anyway?
- TR_EB_blockchain_final2.pdf
- Decentralization is blockchain's USP | Naveen Joshi | Pulse | LinkedIn
- Blockchain evolution: A quick guide and why open source is at the heart of it | Opensource.com
- What is Blockchain Technology? A Step-by-Step Guide For Beginners
- Server Not Found
- https://en.wikipedia.org/wiki/Distributed_ledger
- https://duckduckgo.com/?q=blockchain+vs+database&t=ffab&ia=web
- https://duckduckgo.com/?q=ledger+vs+blockchain&t=ffab&ia=web
- security - What is the origin of insecure 64-bit nonces in signatures in the Bitcoin chain? - Bitcoin Stack Exchange
- Proving Digital Events (Without Blockchain) - Bozho's tech blog
- Blockchain For Students 101 -The Basics (Part 1) – Hacker Noon
- Blockchain - Wikipedia
- Proof of work - PoW - Challene-Response/Solution-verification - TPM - Bitcoin, Hashcash - mitigation against Denial of Service DoS attacks
- White Paper · ethereum/wiki Wiki · GitHub
- How the Bitcoin protocol actually works - definitive breakdown | DDI
- Blockchain Demo
- What is the difference between a cryptocurrency, a digital currency, and a virtual currency? - Quora
- Cryptocurrency - Wikipedia
- Digital currency - Wikipedia
- https://en.wikipedia.org/wiki/Satoshi_Nakamoto
- Bitcoin network - Wikipedia
- mining theory - How many hashes create one Bitcoin? - Bitcoin Stack Exchange
- ImponderableThings (Scott Driscoll's Blog): How Bitcoin Works Under the Hood - anonymity, TOR - double spending
- https://www.youtube.com/playlist?list=PLXKn7LtkQIZVeXF-KzcCPo_2pyvCMza6p
- http://www.imponderablethings.com/2014/09/the-essence-of-how-bitcoin-works-non.html
- Bitcoin and cryptocurrency algorithms and implementation tutorial, blockchain - definitive basic explanation - decentralized peer-to-peer P2P networks - cryptographic hashing, infinite monkey theorem | Toptal
Nakamoto_Paper_Explanations
- Satoshi Nakamoto’s Bitcoin Whitepaper: A thorough and straightforward walk-through
- The Bitcoin White Paper Explained
- Bitcoin white paper explained (PART 1/3) - Coinmonks - Medium
- Bitcoin White Paper for normal people! - Wan Raitelli - Medium
- Bitcoin Whitepaper Explained so Anyone Can Understand - Crypto Disrupt
- The Bitcoin White Paper Explained, What you NEED to Know!
- ep 13: How is bitcoin "locked" to an address - OP_CHECKSIG, locking scripts, signatures, UTXO chain - YouTube
Usage_Basics
- Bitcoin: Seven questions you were too embarrassed to ask | Ars Technica
- Living On Bitcoin For A Week: The Journey Begins
- https://blockonomi.com/cash-out-cryptocurrencies/
- https://duckduckgo.com/?q=cryptocurrency+vs+digitial+currency+vs+virtual+currency&t=ffab&ia=web
- https://arstechnica.com/tech-policy/2017/12/bitcoin-a-beginners-guide/3/
- What is Cryptocurrency? examples
Exchanges
- Cryptocurrency exchange -
- Ethereum - Wikipedia
- Ripple (payment protocol) - Wikipedia
- Bitcoin Cash - Wikipedia
- EOS.IO - Wikipedia
- What is EOS cryptocurrency? - Quora
- ZB currency wikipedia at DuckDuckGo
- OKEx - Wikipedia
- Huobi - Wikipedia
- https://duckduckgo.com/?q=bitcoin+vs+ethereum&ia=cryptocurrency
- https://www.inverse.com/article/39360-bitcoin-vs-litecoin-vs-ethereum-the-difference-in-the-cryptocurrencies
- https://99bitcoins.com/bitcoin-vs-ethereum-cryptocurrency-comparison/
- List of cryptocurrencies
- bitcoind - How do exchanges decide on cryptocurrency trading pairs? - Bitcoin Stack Exchange
- Why Are Trading Pairs Important In Cryptocurrency? - The CryptoStache
- Cryptocurrency Trading: Understanding Cryptocurrency Trading Pairs & How it Works - Master The Crypto
Wallets
- Official TREZOR Shop
- WALLETH - Android Ethereum wallet
- Top 4 Cryptocurrency Wallets - Bitcoinist.com
- How are public and private keys related to the wallet? - Bitcoin Stack Exchange
- I have Bitcoins in a local wallet, how do I get my Bitcoin Cash without using an exchange? - Bitcoin Stack Exchange
Dangers_And_Concerns
- The Hard Math Behind Bitcoin's Global Warming Problem | WIRED
- Carney calls for crackdown on crypto-currency 'mania' - BBC News
- Please don’t buy bitcoin with your credit card – BGR
- Crypto Correction: Bitcoin and Ether Dive as Market Sheds $13 Billion - CoinDesk
- Oh, Crap! Someone Accidentally Triggered A Flaw That Locked Up $280 Million In Ethereum
- Ethereum Continues Improvements Amid Bitcoin Bickering
- 100 cryptocurrencies described in four words or less | TechCrunch
- Bitcoin’s insane energy consumption, explained | Ars Technica
- Understanding Ethereum Smart Contracts - Gjermund Bjaanes
- BitTorrent inventor announces eco-friendly bitcoin competitor Chia | TechCrunch
- Unforeseen Consequences and that 1929 vibe - Charlie's Diary
- Microsoft and IOTA launch first cryptocurrency market for the Internet of Things
- 30 People Who Were Really Wrong About Bitcoin - Bitcoin News
- Zcoin, une extension du Bitcoin au centre d'une énorme fuite estimée à 400 000 $, les failles d'un projet open source
- MobileCoin: A New Cryptocurrency From Signal Creator Moxie Marlinspike | WIRED
- Bitcoin Reaches End of An Era: Expert Blog
- Bitcoin Crash: Here's What We Know About Big Cryptocurrency Price Drop | Inverse
- Dai | Dashboard
- A Long-Secret Bitcoin Key Is About to Be Revealed - CoinDesk
- Living On Bitcoin For A Week: The Journey Begins
- filecoin.io/
Bio-Informatics
- [1809.08632] BrainNet: A Multi-Person Brain-to-Brain Interface for Direct Collaboration Between Brains
- Bioinformatics - Wikipedia
- Researchers Convert Human Bacteria into World’s Tiniest Tape Recorder
- Bio-programming toolkit maker Asimov launches with $4.7M from Andreessen Horowitz | TechCrunch
Miscellaneous
Office
Graphics
Blender
- how to export animation in blender to collada - Google Search
- how to export animation in blender to collada - Google Search
- color animation blender - Google Search
- color change animation tutorial-blender - YouTube
- Blender Help 11: Animate Color Change Transitions in Blender Beginner Tutorial - YouTube
- how to export animation in blender to collada - Google Search
- unjoin objects in blender - Google Search
- how to join and unjoin in blender 3d v2.76 :spoken tutorial (easy, beginner) - YouTube
- Blender Basics 07 - Separate and Combine Meshes - YouTube
- Tinkering with OpenShot for video editing | Opensource.com
PDFs
- Open source PDF readers, creators, and editors | Opensource.com
Geolocation
- 3 open source alternative to desktop GIS tools | Opensource.com
Productivity_driven
- Pomodoro Technique - Time Management - Wikipedia
- List of IEEE milestones - Wikipedia
- What is Flash? Adobe Flash, vs HTML 5, flash memory, SSD
Resources
- All IT eBooks - Free IT eBooks Download
- Free Knowledge Base- The DUCK Project: information for everyone
- 200 universities just launched 560 free online courses. Here’s the full list.
- Karl Steltenpohl's Terminal
- GitHub - jwasham/computer-science-flash-cards: Mini website for testing both general CS knowledge and enforce coding practice and common algorithm/data structure memorization.
- 6 Best Alternatives for The Pirate Bay
- GitHub - sindresorhus/awesome: Curated list of awesome lists
- Corkami · GitHub
- Ken Williams Home Page
- IT Books
- Articles - Ciro Santilli
- Andrew S. Tanenbaum, Professor at the Vrije Universiteit
- GitHub - lancetw/ebook-1: A collection of classic computer science books from Internet
Jobs
- More than 18,000 tech jobs announced across Ireland in 2018
Freelance
Freelancers_Management_Best_Practices
Tools_and_Sheets
Freelance_Tips
- tips for using freelancer at DuckDuckGo
- Use these Upwork tips at your own risk
- 17 Tips for Boosting Your Success on Upwork - Hiring | Upwork
- New to Upwork? 9 Tips For a Successful Freelance Business
- 5 Tax Tips for U.S. Freelancers - Hiring | Upwork
- Mistakes Freelancers Make When Setting Their Rates—and Ideas to Fix Them - Hiring | Upwork
- Upwork Access Denied
- 10 Ways to Be More Professional on Upwork - Hiring | Upwork
- How to make $1,000+ per week on Upwork — Jake Jorgovan
- Upwork Tips: Essential Tips for Upwork and Other Freelance Job Boards - HomeWorkingClub.com
- Tips and Tricks for Creating an Irresistible Upwork Profile - Freelancer Insights
- Beginner’s Guide: How To Get More Freelance Jobs At Upwork
- How To Get More Jobs On Upwork: 14 Tips
- How to Get to the Top on Upwork - Laura Pennington
- How to get your Upwork profile approved (even if you got rejected 10x)
- 10 Insanely Actionable Tips for Successful Freelancing (2018)
[Folder Name]
- Freelancer.com Reviews - Is it a Scam or Legit?
- Does the freelancer website really work or is it a scam? - Quora
- Dashboard
- How to Avoid Scams on Upwork and Freelancer | Screenshot Monitor Blog
- 8 ways to find legit freelance work | CIO
- Top 25 Freelance Websites to Find Work in 2018
- My Review of Freelancer.com Platform
- is freelancer.com safe? | freelancer.com reviews |check freelancer.com for fraud and risk | is freelancer.com genuine or a scam
- Is freelancer.com trusted? - Quora
- caution freelancer payment at DuckDuckGo
- Freelance or self-employed? Here’s how to survive | Money | The Guardian
- 15 Mistakes Businesses Make When Billing their Customers - Due
- The Ultimate Guide To Getting Paid As A Freelancer (2018 Edition) - Double Your Freelancing
- How to Avoid High PayPal Fees: A Trick for Freelancers
- Freelancers: How Do You Get Paid? — SitePoint
- How To Invoice Freelance Clients and Get Paid Online
- How to Get Paid Online Without Losing Your Money or Your Mind | Be a Freelance Blogger
- The Top 5 Ways to Pay Outsourced Employees & Freelancers
- Problem loading page
- How to receive payments: 14 tools for freelancers
- 7 PayPal Alternatives for Freelancers to Collect Payments in WordPress
- Money Matters, Part 1 of 6: Declaring PayPal Income | Men with Pens
- Freelance Rate Calculator by Double Your Freelancing
- 5 Options for Avoiding PayPal Fees & Keeping All Your Freelance Writing Pay - Freelance Writing Jobs | A Freelance Writing Community and Freelance Writing Jobs Resource
- Freelance fees: hourly or per project?
- The freelancer’s short guide to getting paid
- is it mandatory to give debit card number to create paypal account at DuckDuckGo
- Double Your Freelancing Rate - Double Your Freelancing
- Is it safe to create a PayPal account by giving away the CVV number of a credit card and your bank account password for online banking? - Quora
- The future of work in cyber security. Is it freelance? | Jane Frankland | Pulse | LinkedIn
- Comment devenir freelance : Le guide de démarrage
- Devenir freelance : le guide pour choisir son statut
- devenir travailleur indépendant
- 15 logiciels de facturation pour gérer vos factures →
- Freelance : 6 conseils pour éviter les impayés
- Freelance, comment fixer vos tarifs ?
- 6 compétences pour devenir freelance
- Comment trouver des clients ? 20 conseils à partager
Payment_Methods
- Flattr - Creators
- Payoneer: International Money Transfers: Quick, Secure & Low Cost
- payoneer vs paypal at DuckDuckGo
- Select How You Get Paid – Upwork Help Center
Legislation
- Flag Theory for Offshore Companies, Banking, Passports & Residency
- Complete List of Countries with No Taxes in 2017 - Flag Theory
French_Legislation
Taxes
- À partir de quand un micro-entrepreneur est-il soumis à la CFE ? - professionnels | service-public.fr
- Un micro-entrepreneur peut-il déduire ses charges ? abattement | Assistant-juridique.fr
Tax_Allowance
- L'abattement du micro-BNC (bénéfices non commerciaux) | Le guide du micro-entrepreneur
- Impôts : qu’est-ce qu’un abattement ?
- Auto-Entrepreneurs : comment déclarer votre Impôt sur le Revenu 2019 ?
[Folder Name]
- Centre de Formalités des Entreprises
- Centre de Formalités des Entreprises
- Bienvenue à l'Urssaf Provence-Alpes-Côte d'Azur - Urssaf.fr
- Activité artisanale : documents à fournir lors de l'immatriculation | AFE, Agence France Entrepreneur
- Le régime du micro-entrepreneur – Guichet-entreprises.fr
- La demande d’Accre – Guichet-entreprises.fr
- L’Aide aux Chômeurs Créateurs ou Repreneurs d’Entreprises (Accre) – Guichet-entreprises.fr
- Aide au chômeur créant ou reprenant une entreprise (Accre) - professionnels | service-public.fr
- En début d'activité, un micro-entrepreneur a-t-il droit au dispositif Accre ? - professionnels | service-public.fr
- Aide aux chômeurs créateurs ou repreneurs d’une entreprise (ACCRE) - Ministère du Travail
- Devenir travailleur indépendant sur le web : quel statut ?
- Déclaration de micro-entrepreneur (auto-entrepreneur) - professionnels | service-public.fr
- Micro-entrepreneur : que se passe-t-il en cas de dépassement du seuil du chiffre d'affaires ? - professionnels | service-public.fr
- Organismes conventionnés
- Régime auto-entrepreneur, quelles démarches pour adhérer ?
- La liste des aides aux entreprises
- Questions-Réponses
- Demande d'aide à la création et à la reprise d'une entreprise (Accre) | service-public.fr
- Micro-entrepreneur : quand déclarer son chiffre d'affaires ? - professionnels | service-public.fr
- Combien coûte la création d'une entreprise ou la déclaration d'une activité? - professionnels | service-public.fr
- Devenir freelance : le guide pour choisir son statut
- Se déclarer autoentrepreneur : comment faire ?
- Portail officiel des micro-entrepreneurs
- Comment déclarer votre activité d’auto-entrepreneur ?
- Pas à pas 9 : Option pour l’EIRL
- Pas à pas 10 : Votre protection sociale
- Comment déclarer ? Choix du prélèvement fiscal libératoire
- Comment calculer vos cotisations ?
- Auto-entrepreneur et salarié: le cumul est-il possible?
- Cotisations sociales des entrepreneurs : comparaison entre le régime des TNS et celui des salariés | AFE, Agence France Entrepreneur
- Tout savoir sur le régime micro-entrepreneur, auparavant dénommé auto-entrepreneur | AFE, Agence France Entrepreneur
- Mentions obligatoires sur une facture - professionnels | service-public.fr
- Factures : quelles sont les mentions obligatoires?
- CEDEF - Quelles sont les mentions obligatoires à faire figurer sur une facture ? | Le portail des ministères économiques et financiers
- recruter salarié vs recruter freelancer - Google Search
- Recruter un freelance ou un salarié : quelles différences ?
- Recruter un freelance, l’essentiel à savoir
- Pourquoi avez-vous intérêt à recruter un indépendant pour votre entreprise
- Quels avantages à travailler avec un freelance plutôt que d'embaucher ?
- Les entreprises préfèrent avoir recours à des indépendants plutôt que d’employer des salariés
- Startup : faut-il embaucher un salarié ou un freelance ?
- Micro-entrepreneur ou auto-entrepreneur | AFE, Agence France Entrepreneur
- Accueil \ EIRL.fr
- L'entrepreneur individuel à responsabilité limitée (EIRL) | AFE, Agence France Entrepreneur
- IS ou IR ? Choix du régime fiscal de l'entreprise
ACCRE
- Les aides financières à la création de micro-entreprise : tout savoir
- Aide financière auto-entrepreneur
- Quels documents pour le dossier ACCRE ?
- Remplir et envoyer votre formulaire de demande d'ACCRE
- Le guide pour compléter le formulaire ACCRE
- Chômage: les conditions pour être indemnisé
- Quelles sont les conditions pour avoir droit aux allocations chômage ? | Unedic.fr
- ACCRE et ARCE : faut-il choisir ? comment ça se passe ? 🤔 -
VAT
- Numéro de TVA intracommunautaire - professionnels | service-public.fr
- Demande d'attribution d'un numéro de TVA intracommunautaire à un assujetti non redevable | service-public.fr
- TVA Auto-Entrepreneur : tout comprendre
- Facture auto-entrepreneur et TVA : bien comprendre
- Auto-entrepreneur : faut-il mettre la TVA sur les factures ?
- Comprendre le mécanisme de la TVA pour les entreprises
- TVA auto-entrepreneur 2019 : comment faire sa déclaration ?
- Les taux de TVA en 2019 : 0%, 5.5%, 10% ou 20% ?
- Auto-entrepreneurs : sur quels achats peut-on déduire la TVA ?
Prevelement_a_la_source
- Prélèvement à la source : les indépendants aussi sont concernés
Expenses_Recovering
- Auto-entrepreneur : comment déduire vos frais professionnels ? - &vous
- Comment déduire ses frais professionnels en auto-entrepreneur ? - débours
- Le remboursements de frais en auto-entreprise - débours
- La mission d'un expert-comptable, son rôle : tout comprendre
- Dépassement seuils chiffre d'affaires auto-entreprise : tout savoir
- Statut auto-entrepreneur : 7 avantages et 6 inconvénients
- Augmentation du plafond auto-entrepreneur : tout savoir (2019)
- Les AE déboursent pour leurs clients mais oublient les débours - AutoEntrepreneur.fr
- Auto-entrepreneur : les changements et nouveautés 2019
- Taxes – Upwork Help Center
- taxes on donations received at DuckDuckGo
- The Difference Between a Freelancer and an Entrepreneur | OPEN Forum
- what is a vat at DuckDuckGo
- impôts sur les dons at DuckDuckGo
- VAT identification number - Wikipedia
- EU Value Added Tax (VAT) – Upwork Help Center
Professional_Insurances
- Hiscox, l’assurance RC pro sur-mesure pour activités libérales
- Responsabilité civile professionnelle informatique | Hiscox
Professional_Banking
- Banque auto entrepreneur : comparatif meilleures banques en ligne 2019
- AUTO-ENTREPRENEURS – La Banque Postale
- The 15 Best Freelance Websites to Find Jobs
- Log in | Toptal
- | Deliver Faster Through Crowdsourcing | Topcoder
- 💬1 - Plateforme des experts freelances du numérique - XXE
- 7 tips for promoting your project and community on Twitter | Opensource.com
- How to make money online
Mathematics
Probability
- Math Forum - Ask Dr. Math
- How to know when to 'add' and when to 'multiply' in questions based on probability - Quora
- Why do we multiply instead of adding in combinations? - Quora
Algebra
Boolean_Algebra
- Boolean algebra (structure) - Wikipedia
- Lattice (order) - Wikipedia
- Complemented lattice - Wikipedia
Numeral_Systems
decimal_system
- why base 10 numeration system is the most popular at DuckDuckGo
- Why have we chosen our number system to be decimal (base 10)? - Mathematics Stack Exchange
- Why do we use decimal system? - Mathematics Stack Exchange
- Is '$10$' a magical number or I am missing something? - Mathematics Stack Exchange
- Math Forum - Ask Dr. Math
Digits_Order_In_Positional_System
- math history - Why are numbers written in descending order? - Mathematics Stack Exchange
- Why are numbers ordered the way they are? - Mathematics Stack Exchange
- why binary is read right to left - Mathematics Stack Exchange
- Babylonian numerals - sexagesimal (base-60) first known positional numeral system inherited from either the Sumerian or the Eblaite civilizations
- Hindu-Arabic numeral system - Wikipedia
- Positional notation - place value numeral systems - base conversion - Wikipedia
- Non-standard positional numeral systems - negative/complex base/radix - mixed base/radix
- Octal - PDP-8/11 - Motorola 68000 - Unix file permissions
- Unary numeral system - Wikipedia
- number theory - Does radix 1 exists? - Mathematics Stack Exchange
- 0 - Wikipedia
- Sign (mathematics) - Wikipedia
- Numeral system - Wikipedia
- 0 - zero - Wikipedia
- Definitive List of numeral systems - Standard/Non-standard positional numeral systems - signed digit representation, balanced ternary, negative bases, negabinary, complex bases, non integer bases, n-adic number, mixed radix/base - non-positional notation, babylonian/roman
- Non-adjacent form - signed-digit representation - non standard positional numeral system - cryptography
- List of numeral system topics - Wikipedia
- Maya numerals - vigesimal (base-20) positional numeral system
- Mixed radix - non-standard positional numeral systems in which the numerical base varies from position to position
- Factorial number system - combinatorics, the factorial number system, also called factoradic, is a mixed radix numeral system adapted to numbering permutations. It is also called factorial base
- Negative base/radix - Negabinary - implementation - non-standard positional numeral system
- Non-integer representation - Wikipedia
- Roman numerals - Wikipedia
Linear_Algebra
- linear algebra - Why, historically, do we multiply matrices as we do? - Mathematics Stack Exchange
- Difference Between Dot Product and Cross Product - DifferenceBetween.com
- difference between dot product and inner product - Mathematics Stack Exchange
- vector algebra: dot product and cross product - Mathematics Stack Exchange
- What is the main difference between a dot product and a cross product? - Quora
- Inner product space - vector space with structure associating each pair of the space's vector to their inner/scalar/dot product - Wikipedia
- Dot product - scalar product - called Inner /Projection Product in Euclidean Geometry - Wikipedia
- Cross product - Wikipedia
- Hermitian matrix - Wikipedia
- Tensor product - Wikipedia
- Adjugate/Classical Adjoint/Adjunct matrix - transpose of cofactor matrix - Wikipedia
- Linear map - Application linéaire - Wikipedia
- Transpose of a matrix - Wikipedia
- Matrix multiplication - Wikipedia
- matrices - Intuition behind Matrix Multiplication - Mathematics Stack Exchange
- Norm (mathematics) - inner product
- Complex number - norm, argument
- linear algebra - What is the norm of a complex number? - Mathematics Stack Exchange
- Relationship between inner product and norm - Mathematics Stack Exchange
- Outer product - Wikipedia
- What is an intuitive understanding of the outer product of two vectors? - Quora
- Tensor - Wikipedia
- Radix - numeral base
- Method of complements - radix complement/diminished radix complement - Generalization of two's complement - ten's complement, nines complement - substraction giving negative result, with subtrahend greater than minuend - Wikipedia
- arithmetic - Proof of the standard algorithm for addition? carry method proof along the way - Mathematics Stack Exchange
- Radix economy - numeral base - ternary tree
- associativity in mathematics at DuckDuckGo
Logic
Vacuous_Truth
- Vacuous truth - Wikipedia
- logic - What precisely is a vacuous truth? - Mathematics Stack Exchange
- elementary set theory - Quantification over the empty set - Mathematics Stack Exchange
- logic - Vacuous Truth and Universal Conditional Statements - Mathematics Stack Exchange
- logic - Intuition behind Vacuous proofs - Mathematics Stack Exchange
- Empty set - Vacuous Truth
- CONDITIONAL ASSERTIONS
- Material conditional - Wikipedia
- Strict conditional - Wikipedia
- elementary set theory - Why is "for all $x\in\varnothing$, $P(x)$" true, but "there exists $x\in\varnothing$ such that $P(x)$" false? - Mathematics Stack Exchange
- Contraposition - Wikipedia
- Proof by contrapositive - Wikipedia
- Modus tollens - Wikipedia
- CS2742 -- Logic for Computer Science - academic course -
Set_Theory
- Cartesian product - Wikipedia
- Permutation - arranging members of a set
- Secret Link Uncovered Between Pure Math and Physics | Quanta Magazine
- Mathematicians Find Wrinkle in Famed Fluid Equations | Quanta Magazine
- Total order - Wikipedia
- Online LaTeX Equation Editor - Useful for stackexchange post - create, integrate and download
Order_Theory
- Upper and lower bounds - Wikipedia
- Order theory - Wikipedia
Calculus
- Partial function - total function
- Recursive set - In computability theory, a set of natural numbers is called recursive, computable or decidable if there is an algorithm which takes a number as input, terminates after a finite amount of time (possibly depending on the given number) and correctly decides whether the number belongs to the set or not.
- Geometric series - formula of sum of the first n terms of a geometric series
- Geometric progression - Wikipedia
- Rounding - Arrondi - ceiling/round up - flooring/round down -Wikipedia
- Fundamental theorem of calculus - Wikipedia
- exponentiation - Why does any nonzero number to the zeroth power = 1? - Mathematics Stack Exchange
- Zero to the power of zero - IEEE 754-2008 floating-point standard - C, C++
- Empty product - Wikipedia
- Exponentiation - Wikipedia
- intuition - Numbers to the Power of Zero - Vectornaut definitive answer -
- Is [math]\sqrt[x]{x}^{{{{{{\sqrt[x]{x}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^{\sqrt[x]{x}}}^\cdots}=x[/math] true? - Quora
- Natural logarithm - Wikipedia
- Logarithm - inverse of exponentiation
- Base (exponentiation) - Wikipedia
- Transcendental number - proof sketch that e is transcendental
- e (mathematical constant) - base of natural logarithm
- logarithms - log base 1 of 1 - related to division by zero 0 - definitive intuitive proof
- logarithms - The difference between log and ln - common base 10 vs natural base e logarithm
Resources
- The On-Line Encyclopedia of Integer Sequences® (OEIS®)
- thyme/math at master · djtrack16/thyme · GitHub
Arithmetics
- Prime Numbers | Brilliant Math & Science Wiki
- Variants of induction
- Induction
- Modular arithmetic - modulo - congruence
- Lattice (group) - Wikipedia
Physics
Geology
- As Earth's rotation slows, 2018 could see a spike in large earthquakes — Quartz
- The Earth is making a weird noise, and researchers have no idea why – BGR
Astrophysics
- How plausible is Elon Musk’s plan to colonize Mars?
- Astronomers are puzzled by a huge object at the centre of our galaxy - ScienceAlert
- What is dead may never die | Astronomy.com
- Bill Nye was asked "If the sun is hot, why is space cold?" on Reddit. Here's why. — Quartz
- The Alien Observatory --"Ten Undiscovered Worlds are Favorably Located to Detect Earth" (WATCH Video) - The Daily Galaxy --Great Discoveries Channel
- Codename Zuma: All about SpaceX's secret launch
- Hacker says NASA is editing out UFOs from the videos before releasing them » TechWorm
- Enceladus heats up because its core is like a sponge | Ars Technica
- Russians claim they’ve found the first extraterrestrial life, and it was right under our noses – BGR
- Space station bacteria 'come from outer space,' cosmonaut says - CNET
- Astronomers Are Gearing Up to Listen for Evidence of Aliens from a Mysterious Interstellar Object
Electricity
- Articles on "Electricity" WJ Beaty
- Electrical cable - Wikipedia
Resources
- Les Podcasts de l'Université de Grenoble » Université de Savoie
- "Quark Fusion" Produces Eight Times More Energy Than Nuclear Fusion
- Physicists just found a loophole in graphene that could unlock clean, limitless energy - ScienceAlert
- IceCube turns the planet into a giant neutrino detector – Ars Technica
- Experiment demonstrates quantum mechanical effects from biological systems
- Secret Link Uncovered Between Pure Math and Physics | Quanta Magazine
- Newly discovered property of graphene could lead to infinite clean energy | Inhabitat - Green Design, Innovation, Architecture, Green Building
- New quantum liquid crystals may play role in future of computers
- Scientists Have Discovered a New Form of Matter Called "Excitonium"
- Engineers create artificial graphene in a nanofabricated semiconductor structure
- This breakthrough in tractor beam tech could pave the way to levitating humans
- Generalized Hardy's paradox shows an even stronger conflict between quantum and classical physics
- Quantum Memory Storage is More Efficient and Secure Than Ever
Financial
- I Will Teach you to be Rich - Ramit Sethi - pdf
- كيف تحسب زكاة المال
- Ultralight personal aircraft | Plane4You Aircraft Sales Center
Geopolitics
- List of multinational companies with research and development centres in Israel - Wikipedia
- The National Interest - warfare, cyberwarfare, geopolitics
- constitution - Interdependence and independence of powers - Politics Stack Exchange
- democracy - How do democracies maintain the independence of judiciary? - Politics Stack Exchange
Linguistics
Lessons_and_Articles
Arabic
English
- I'd better vs I better - English Language & Usage Stack Exchange
- When to use "If I was" vs. "If I were"? - English Language & Usage Stack Exchange
- Compare with or compare to? | Oxford Dictionaries
- grammar - How to use "to + V-ing"? - English Language & Usage Stack Exchange
- best app to learn English grammar - Google Search
- Question - Quora
- best app to learn English grammar - Google Search
- The English language: All the difficult pronunciations of English in "The Chaos" poem by Gerard Nolst Trenité — Quartz
- Scripps National Spelling Bee: What makes the winning words so hard? — Quartz
- Telling The Time in English – English Study Page
- possessives - When a word ends in 's' or 'x', do you add 's or just an '? - English Language Learners Stack Exchange
- # Number sign - dièse - pound sign, hash - Symbols definitive list - english names and pronounciation
- word usage - have difficulty vs have hard time vs have trouble vs struggle - English Language Learners Stack Exchange
- word choice - Difference between "computation" and "calculation" - English Language & Usage Stack Exchange
Japanese
- which alphabet Japaneses use the most - Google Search
- if you speak Japanese can you speak Chinese - Google Search
- how to pronounce Japanese correctly - Google Search
- how to learn japanese by watching anime - Google Search
- Learn Japanese – Tae Kim's Guide to Learning Japanese
- why do japanese not use only kanjis - Google Search
- which alphabet Japaneses use the most - Google Search
- if you speak Japanese can you speak Chinese - Google Search
- how to pronounce Japanese correctly - Google Search
Hebrew
- ברוכה pronunciation: How to pronounce ברוכה in Hebrew
Arabic
- What's the difference between a tonal language and a pitch accent language? - Quora
Translators
- Thesaurus - Defs & Synonyms
- Idioms and phrases
Medias
- BEST THRILLERS!!!! NOW-2018 - IMDb
- Diriliş: Ertuğrul - Season 4 - Watch Full Episodes for Free on WLEXT
- Watch Movies Online Free - hdonline.to
- Home - Animelon
- Baki (2018) at Gogoanime
- Read Attack on titan/Shingeki no kyojin Manga
- Watch Redbad For Free On hdonline.to
Games
- Far Cry 5 (Region Free) PC Download - Nitroblog
- Far Cry 5 (v1.4.0.0, MULTi15) [FitGirl Repack, Selective Download] from 15.5 GB : CrackWatch
- Nitroblog - PC PS3 VITA WII ISO ROM Download
- 18 Best Free Movie Streaming Sites Without Sign Up 2020
- FMovies | Watch Movies Online Free on FMovies.to
- FMovies | Watch Angel Heart (1987) Online Free on fmovies.wtf
- أفضل التطبيقات المجانية لتعّلم اللغات عبر هاتفك الذكي
- Linguee | Dictionary for German, French, Spanish, and more
- Thesaurus.com | Synonyms and Antonyms of Words at Thesaurus.com
Calisthenics
- Paul Wade | PCC Blog
- The Tao of PCC by Paul Wade | PCC Blog
- Paul Wade | PCC Blog - Part 2
- Paul Wade | A Dirty Dozen - bodyweight alternatives for free weight exercises - rope climbing - hamstrings - cardio training
- Al Kavadlo’s Blog | Al Kavadlo | Calisthenics Workouts & Bodyweight Exercises
- Amazon.com: Rough Strength Files: 42 Ideas on Low-Tech Strength Training eBook: Alex Zinchenko, Paul Wade: Books
- Amazon.com: Mental Muscle: How to Use the Full Power of Your Mind to Develop Superhuman Strength eBook: Logan Christopher, Paul Wade: Books
- Amazon.com: Diamond-Cut Abs: How to Engineer The Ultimate Six-Pack--Minimalist Methods for Maximal Results eBook: Danny Kavadlo, Paul Wade: Books
- Cartographie des méduses en Région PACA - jellyfishes
Misc
- Tony Ferguson Strength Training Highlights | Training World - YouTube
- 5 Ways To Boost Collagen For Tendon And Ligament Strength - Furthermore
- Testosterone: What You Need To Eat For Better T-Levels
- The Prepping Guide: Survival Planning, SHTF Plans & Doomsday Prep
- Prepare Your Hamstrings for Sprinting With This Warm-Up Drill | STACK
- Proper Warm-up for Sprinting
- Tip: Prepare Your Hamstrings for Sprinting | T Nation
- The Perfect Warmup For Speed Workouts – PodiumRunner
- 4 Exercises to Strengthen Weak Hamstrings | STACK
- Why Your Hamstring Stretching Routine Isn't Working | STACK
Other
- DEVENIR INÉPUISABLE EN 7 MINUTES SANS MATÉRIEL - cardiovascular training
- RCH-01 | RepliCel - hair loss treatment
- Hair Transplants: All Your Questions Answered
- Eight baldness cures that could soon put an end to your hair loss woes
- After Hair Transplantation | Dr Serkan AYGIN Clinic | Dr Serkan Aygin Clinic
- How Do You Choose the Best FUE Hair Transplant Doctor? | FUE Magazine
- All You Need to Know: A Guide to Hair Transplant in Turkey - choosing right clinic
- Hair Transplant – Why You Might NOT Regret Being Bald in 2018
- 5 Factors That Contribute to a “Failed Hair Transplant” | Dr Serkan Aygin Clinic
- 8 Things About Hair Transplantation | Dr Serkan Aygin Clinic
- Comment éviter et faire disparaitre les cheveux blancs naturellement-Coloration et traitement - Mon Huile essentielle
- Les masques à l'huile de ricin - Le guide beauté cheveux
- Top 9 Oils That Are Good For Forestalling Gray Hair | Gaizupath
- White Hair Treatment, Let Natural Herbs Work On Your Scalp | Gaizupath
- Les 5 bienfaits de l’huile d’argan - Secrets de Miel
- 3 recettes de soin cheveux maison pour cheveux secs - Biba
- Is argan oil good for sensitive acne prone skin? - Quora
- Georges St-Pierre - The Best Training in One Video!!! - YouTube
- Imbalances in muscle and tendon strength and the relation with injuries and performance
- Imbalances in the Development of Muscle and Tendon as Risk Factor for Tendinopathies in Youth Athletes: A Review of Current Evidence and Concepts of Prevention - definitive
- Exercise Strengthens Your DNA - Men's Journal
- Regular Exercise Induces Changes in DNA
- Sports Injury Prevention Tips
Travelling
- Travel Resources & Budget Tips • Expert Vagabond
- Home | Official ESTA Application Website, U.S. Customs and Border Protection
- Green Cards and Permanent Residence in the U.S. | USAGov
- Barcelona Boat Party ~ The 4 Best Party Cruises for 2019 (with photos!)
- How long can a B1/B2 visa holder stay in the US?
Car_Renting
- Car Rentals from Avis, Book Online Now & Save | Avis Car Rental | Avis Rent a Car
Places_To_Visit
US
Georgia
- 7 Places in Georgia You Have to Visit That You Didn't Know Existed
- travel to europe by ship - Google Search
- www.businessinsider.com
- travel to europe by ship - Google Search
- How to Travel to Europe by Boat | USA Today
- freighterworld.com - freighterworld Resources and Information.
- Transatlantic Freighter Travel
- Freighter Cruises
- Iconic Transatlantic cruises 2018 & 2019 - Cunard
- travel to europe by ship - Google Search
- www.businessinsider.com
- www.businessinsider.com
- How to Keep Your Sanity at the Airport This Holiday Season | Travel + Leisure
- The simple trick to ensuring your bag is first at the carousel
- 5 TSA-Approved Hacks for Holiday Travel | MyDomaine
- Where to Rent a Car Using a Debit Card | USA Today
- Formulaire ESTA | Office du tourisme des USA - travel
- Passeport, ESTA, Visa | Préparez votre voyage aux Etats-Unis avec l'Office du Tourisme des USA.
- 8 Steps To Freedom: How I Quit My Job And Traveled The World - Lifestyle & Travel Blog
Administrative
USA internship
Flights
- adioso
Room_rent
- Remotely Exploitable Flaw Found In HP Enterprise Printers—Patch Now
- Stage USA - Conseils, Offres de stage, Visa J-1
- Blog MyInternshipAbroad - Tous nos conseils pour trouver un stage à l'étranger
- L'Etudiant Voyageur - Webzine du voyage étudiant
- FSDIE Social - Crous Aix Marseille Avignon
- Search Ireland's No. 1 Property Website | apartment rental
- Compensation: Cashing out Facebook relocation benefits - Blind
- 5 Things to Ask for Before Relocating for a New Job-The Muse
- What Should A Relocation Package Include?
- What does Twitter or Facebook offer in terms of relocation benefits for new employees? - Quora
- Relocation Packages in Tech. Industry Insights from Relocate.me | Relocate.me Blog
- Facebook Gives Employees Big Money to Move Closer to Work – Fortune
- What are all the perks that Facebook employees get? - Quora
todownload
- Click Here to Kill Everybody: Security and Survival in a Hyper-connected World pdf at DuckDuckGo
- HP Gaming PCs - HP OMEN Family | HP® Official Site
- Razer Gaming Laptops and Ultrabook - Blade, Blade Stealth, and Blade Pro | Razer Europe
- Books - Shichao's Notes
- The Legacy Code Programmer's Toolbox is Out - Fluent C++
- What Math Do You Need To Read The Art Of Computer Programming? - Stack Overflow
- Reusable Firmware Development filetype:pdf at DuckDuckGo
- Java Network Programming, 3rd Edition
- Android Development Patterns
- WebAssembly in Action
- How Linux Works, 2nd Edition - pdf - Free IT eBooks Download
- Effective awk Programming, 4th Edition
- Beginning Git and GitHub
- Deep Learning Pipeline
- LearnCKR/The C Programming Language - 2nd Edition - Ritchie Kernighan.pdf at master · kusti8/LearnCKR · GitHub
- Unit Testing Principles, Practices, and Patterns - pdf - Free IT eBooks Download
- Programming Persistent Memory - pdf - Free IT eBooks Download
- Azure Internet of Things Revealed
- Software Security: Building Security In - PDF Free Download
- Introducing Algorithms in C - pdf - Free IT eBooks Download
- The CERT ® Oracle ® Secure Coding Standard for Java ™ - The CERT Oracle Secure Coding Standard for Java [Long, Mohindra, Seacord, Sutherland & Svoboda 2011-09-18].pdf
- Practical Rust Projects - pdf - Free IT eBooks Download
- Basic Math for Game Development with Unity 3D - pdf - Free IT eBooks Download
- Serverless Programming Cookbook
- Download ePub (2.3 MB)
- Download PDF (4.2 MB)
- Regular Expression Recipes for Windows Developers - pdf - Free IT eBooks Download
- The Architecture of Privacy - pdf - Free IT eBooks Download
- BeagleBone for Secret Agents - pdf - Free IT eBooks Download
- Waging Cyber War - pdf - Free IT eBooks Download
- The Secret Life of Programs - pdf - Free IT eBooks Download
- Linux Hardening in Hostile Networks Kyle Rankin filetype:pdf at DuckDuckGo
- Software Build Systems: Principles and Experience - pdf - Free IT eBooks Download
- The IoT Hacker's Handbook - pdf - Free IT eBooks Download
- https://the-eye.eu/public/Books/HumbleBundle/cryptography_engineering_design_principles_and_practical_applications.pdf
- Practical Artificial Intelligence - pdf - Free IT eBooks Download
- Web Security for Developers - pdf - Free IT eBooks Download
Local_Resources
Systems - Networks Pwning
- 0.2014_FSU-OffensiveComputerSecurity_syllabus.pdf
- 01_FSU-OCS_Introduction-slides.pdf
- 02.FSU-OCS_Essential_C_Security_101-slides.pdf
- 03.FSU-OCS_Essential_C_Security_102-slides.pdf
- Understanding_Integer_Overflow_in_C-Cpp.pdf
- Startpage.com - The world's most private search engine
- Hacking; The Art of Exploration - Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
- Startpage.com - The world's most private search engine
- Secure_Coding_C_Cpp-2ndEd-2013-Seacord.pdf
- Practical_Malware_Analysis-2012-Sikorski-Michael.pdf
- The_Shellcoders_Handbook_2ndEd-2007.pdf
- The Web Application Hacker's Handbook - The_web_application_hackers_handbook-2ndEd-2011-Stuttard_Pinto.pdf
- Startpage.com - The world's most private search engine
- Guide to Computer Network Security, 3rd edition-2015.pdf
- Building Secure and Reliable Systems - Building_Secure_and_Reliable_Systems-2020-Google.pdf
- Handbook of Communications Security - Handbook of Communications Security.pdf
- Introduction to Computer Networks and Cybersecurity_2013.pdf
- Network Attacks and Defenses- A Hands-on Approach-2013.pdf
- Network Attacks & Exploitation: A Framework - Network Attacks and Exploitation A Framework.pdf
- The Fundamentals of Network Security - The Fundamentals of Network Security_2001.pdf
- Attacking Network Protocols - Attacking-Network-Protocols-A-Hacker-s-Guide-to-Capture-Analysis-and-Exploitation.pdf
- Wireshark® for Security Professionals - Wireshark-for-Security-Professionals-Using-Wireshark-and-the-Metasploit-Framework.pdf
- NTP Security.pdf
- Startpage.com - The world's most private search engine
- www.lib.ommolketab.ir - Practical_Unix_And_Internet_Security-3rdEd-2003-Garfinkel.pdf
- Linux_Security_Cookbook-2003-Barrett_Byrnes_Silverman.pdf
- Practical Linux Security Cookbook - Practical_Linux_Security_Cookbook-2016-Kalsi.pdf
- Linux Basics for Hackers - Linux_Basics_For_Aspiring_Hackers-2018-OccupyTheWeb.pdf
- System Administration Ethics.pdf
- Linux Firewalls - Linux_Firewalls-2007-Rash.pdf
- Windows Internals, Sixth Edition, Part 1 eBook - Windows_Internals_Part1-6thEd-2012-Russinovitch.pdf
- Windows Internals, Sixth Edition, Part 2 eBook - Windows_Internals_Part2-6thEd-2012-Russinovitch.pdf
- Startpage.com - The world's most private search engine
- Abusing the Internet of Things - Abusing the Internet of Things Blackouts, Freakouts, and Stakeouts.pdf
- Defending IoT Infrastructures with the Raspberry Pi.pdf
- Demystifying Internet of Things Security.pdf
- Introduction to Hardware Security and Trust - Introduction to Hardware Security and Trust.pdf
- Practical Internet of Things Security - Practical Internet of Things Security_2016.pdf
- The_IoT_Hacker-s_Handbook-2019-Gupta.pdf
- Startpage.com - The world's most private search engine
- Counterterrorism and Cybersecurity_2013.pdf
- Digital Security: Cyber Terror and Cyber Security - Digital Security- Cyber Terror and Cyber Security_2010.pdf
- Handbook of Computational Approaches to Counterterrorism_2013.pdf
- Inside Cyber Warfare - Inside Cyber Warfare, 2nd Edition.pdf
- Transnational Security.pdf
- Waging Cyber War.pdf
- Startpage.com - The world's most private search engine
- Certified Ethical Hacker Foundation Guide-2016.pdf
- CEH v10 Certified Ethical Hacker Study Guide.pdf
- CEH v9 Certified Ethical Hacker Version 9-2016.pdf
- CEH v9 Certified Ethical Hacker Version 9_Study_Guide-2016.pdf
Reverse Engineering - Binary Exploitation - Secure Coding
- Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
- Startpage.com - The world's most private search engine
- Learning Linux Binary Analysis - Learning Linux Binary Analysis_2016.pdf
- Practical_Malware_Analysis-2012-Sikorski-Michael.pdf
- Practical_Reverse_Engineering-Dang_Gazet-2014.pdf
- RE4B-Dennis_Yurichev.pdf
- Beginning%20x64%20Assembly%20Programming-2019.pdf
- The_Shellcoders_Handbook_2ndEd-2007.pdf
- Your_Code_as_a_Crime_Scene-2015.pdf
- Digital Forensics Basics.pdf
- Practical Digital Forensics - Practical Digital Forensics.pdf
- The Art of Memory Forensics - The_Art_of_Memory_Forensics-2014-Walters_Levy_Case.pdf
- Startpage.com - The world's most private search engine
- The Art of Software Security Assessment - Identifying and Preventing Software Vulnerabilities.pdf
- Secure_Coding_Principles_and_Practices-2003-Graff_VanWyk.pdf
- software-security-building-security-in.pdf
- ISO-IECJTC1-SC22-WG23_N0868-tr24772-1-language-independent-guidance-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0868-tr24772-1-language-independent-guidance-for-formal-editing-20190225.pdf
- ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225 - ISO-IECJTC1-SC22-WG23_N0870-tr24772-3-C-vulnerabilities-for-formal-editing-20190225.pdf
- Secure_Coding_C_Cpp-2ndEd-2013-Seacord.pdf
- Secure_Programming_C_Cpp_Java_Perl_PHP_Python_Tcl_and_Ada95-2015-Wheeler.pdf
- Secure_Programming_Cookbook_for_C_and_Cpp-2013-Viega.pdf
- Security for Web Developers - Security for Web Developers_2016.pdf
- Cryptography_in_C-Cpp-2nd_Edition-2013.pdf
- Building Secure Defenses Against Code-Reuse Attacks.pdf
- Secure Development for Mobile Apps
- Startpage.com - The world's most private search engine
- 0132936593.pdf - Computer_Organization_and_Architecture-9thEd-2013-Stallings.pdf
- Hacker's Delight 2nd Edition.pdf
- ProgrammingGroundUp_0-8.pdf
- 0132633760.pdf - Structured_Computer_Organization-5thEd-2007-Tanenbaum.pdf
- The Secret Life of Programs.pdf
- What Every Programmer Should Know About Memory - What_Every_Programmer_Should_Know_About_Memory-2007-Drepper-RedHat.pdf
- Computer_Organization_and_Design-5thEd-2014-Patterson_Hennessy.pdf
- Advanced_C_and_Cpp_Compiling-2014-Stevanovic.pdf
- Assembly_Language_for_x86_Processors-7thEd-2015-Irvine.pdf
- Beginning x64 Assembly Programming.pdf
- Linkers and Loaders - Linkers_And_Loaders-1999-John_Levine.pdf
- Low-Level_Programming-2017-Zhirkov.pdf
- Modern_X86_Assembly_Language_Programming-2014-Kusswurm.pdf
- Professional assembly language - Professional Assembly Language-2005.pdf
- Stack_Frames-2016-Cataldo.pdf
- Startpage.com - The world's most private search engine
- 21st Century C - 21st Century C, 2nd Edition.pdf
- Le_langage_C-Garreta.pdf
- Modern CModern C - Modern_C-2018-Gustedt.pdf
- Modern_C_Quick_Syntax_Reference_2ndEd-2019-Olsson.pdf
- ebook - The C Programming Language Ritchie & kernighan -.doc - The_C_programming_language_Ritchie-Kernighan.pdf
- Expert C Programming - Expert_C_Programming-Van_Der_Linden.pdf
Web Security - Pentesting
- The Web Application Hacker's Handbook - The_web_application_hackers_handbook-2ndEd-2011-Stuttard_Pinto.pdf
- The_Browser_Hackers_Handbook_2014.pdf
- Hacking Exposed™ Web Applications - Hacking_Exposed_Web_Applications-3rdEd-2011.pdf
- The Hacker Playbook - Practical Guide To Penetration Testing.pdf
- Advanced API Security-2ndEdition-2020
- OWASP Application Security Verification Standard 4.0 - OWASP Application Security Verification Standard 4.0-en.pdf
- OWASP Top 10 - 2017 - OWASP_Top_10-2017_(en).pdf.pdf
- Python Web Penetration Testing Cookbook.pdf
- Web_Penetration_Testing_with_Kali_Linux-2013-Muniz-Lakhani.pdf
- Bug Bounty Hunting for Web Security.pdf
- From Hacking to Report Writing.pdf
- Startpage.com - The world's most private search engine
- Hacking Point of Sale-2014.pdf
- Secure Your Node.js Web Application.pdf
- Securing SQL Server.pdf
- Pro PHP Security - 2nd Edition
- Identity_Attack_Vectors
Cryptography - Privacy - Anonymity
- book.dvi - Introduction_to_Modern_Cryptography-2007.pdf
- Applied Cryptography - Applied_Cryptography-2ndEd-1995-Schneier.pdf
- Cryptography Engineering: Design Principles and Practical Applications - Cryptography_Engineering-2010-Schneier_Ferguson_Kohno.pdf
- Introduction to Cryptography - Principles and Applications-2007.pdf
- Handbook_of_applied_cryptography-1996.pdf
- Cryptology_course-Ritzenthaler.pdf
- 013335475X.pdf - Cryptography_and_Network_Security-6thEd-2013.pdf
- Algorithmic_Cryptanalysis-2009-Joux.pdf
- Codage_cryptologie_et_applications.pdf
- Cryptographic Hardware and Embedded Systems -- CHES 2015.pdf
- Financial Cryptography and Data Security.pdf
- Visual Cryptography and Secret Image Sharing.pdf
- Startpage.com - The world's most private search engine
- Hacking; The Art of Exploration - Hacking-The_Art_of_Exploitation-2nd_Ed-2008.pdf
- 9780133048377.pdf - Computer_Networks-5thEd-2011-Tanenbaum.pdf
- Startpage.com - The world's most private search engine
- Cryptography_in_C-Cpp-2nd_Edition-2013.pdf
- Startpage.com - The world's most private search engine
- The Architecture of Privacy.pdf
- Defensive Security Handbook - Defensive Security Handbook.pdf
- Personal Cybersecurity.pdf
- Self-encrypting_deception-weaknesses_in_the_encryption_of_SSDs.pdf
- PGP-GPG-2006.pdf
- Dark Web- Exploring and Data Mining the Dark Side of the Web_2012.pdf
- Tor_Networking_Vulnerabilities_and_Breaches.pdf
Coding Challenges
- Cracking_The_Coding_Interview-6thEd-2015-McDowell.pdf
- Startpage.com - The world's most private search engine
- Introduction to Algorithms, Third Edition - Introduction_to_algorithms_ed3-Cormen-Liveist.pdf
- Algorithms: A Top-Down Approach - Algorithms_A_Top-Down_Approach-Rodney_Howell.pdf
- The_Art_of_Computer_Programming-Vol1-Knuth.pdf
- Art of Computer Programming Knuth vol v2 - The_Art_of_Computer_Programming-Vol2-2ndEd-1981-Knuth.pdf
- Foundations_of_Computer_Science-1992-Alho-Ullman.pdf
- algorithms_cheats.pdf
- Startpage.com - The world's most private search engine
- 21st_Century_C-2015-2ndEd-Klemens.pdf
- Le_langage_C-Garreta.pdf
- Modern CModern C - Modern_C-2018-Gustedt.pdf
- Modern_C_Quick_Syntax_Reference_2ndEd-2019-Olsson.pdf
- ebook - The C Programming Language Ritchie & kernighan -.doc - The_C_programming_language_Ritchie-Kernighan.pdf
- Expert C Programming - Expert_C_Programming-Van_Der_Linden.pdf
- Advanced_Topics_in_C-Core_Concepts_Data_Structs-2013-Kalicharan.pdf
- Startpage.com - The world's most private search engine
- Cpp17_Standard_Library_Quick_Reference-2ndEd.pdf
- The C++ Programming Language - The_Cpp_programming_language_4th-Stroustrup.pdf
- The C++ Standard Library: A Tutorial and Reference - The_Cpp_standard_library_a_tutorial_and_reference-2nd_ed-Nicolai_m_Josuttis.pdf
- Effective Modern C++ - Effective_Modern_Cpp-2015-Scott_Meyers.pdf
- Clean_Cpp-2017-Roth.pdf
- Startpage.com - The world's most private search engine
Development Projects
- Modern C++ Programming with Test-Driven Development - Modern_Cpp_Programming_with_Test_Driven_Development-2013-Langr.pdf
- Beginning_Cpp17-5th_Edition.pdf
- C++ Primer, Fifth Edition - C++ Primer, 5th Edition.pdf
- The C++ Programming Language - The_Cpp_programming_language_4th-Stroustrup.pdf
- Cpp17_Standard_Library_Quick_Reference-2ndEd.pdf
- Design_Patterns_in_Modern_Cpp-2018-Nesteruk.pdf
- Clean_Cpp-2017-Roth.pdf
- Effective Modern C++ - Effective_Modern_Cpp-2015-Scott_Meyers.pdf
- C++ Concurrency in Action - Cpp_concurrency_in_action-Practical_Multithreading-2012-Anhtony_Williams.pdf
- Cpp_Multithreading_Cookbook-2014-Ljumovic.pdf
- Startpage.com - The world's most private search engine
- 013217197X.pdf - Software_Build_Systems-Principles_and_Experience-Smith-2011.pdf
- Re-Engineering Legacy Software - Re-Engineering_Legacy_Software-2016.pdf
- High Integrity C++ Version 4.0 - High_Integrity_Cpp-coding_std_v.4.0.pdf
Maths - Computational Complexity - Algorithm Analysis
- Concrete Mathematics - Concrete_Mathematics-A_Foundation_of_Computer_Science-1989-2ndEd-Graham_Knuth_Patashnik.pdf
- cheat.dvi - math_cheats.pdf
- Startpage.com - The world's most private search engine
- Computational_Complexity-A_modern_approach.pdf
- Think Complexity-2012.pdf
- Universal Algebra and Computational Complexity Lecture 2 - Universal_Algebra_and_Computational_Complexity_PrWillard.pdf
- CUUS154-FM.dvi - Edmonds_FullProofs.pdf
- Invariants_definitions.pdf
- LeinoLogozzo-paper120.dvi - loop_invariant_on_demand.pdf
- Loop_invariants_induction_recursion.PDF
- Loop_Invariants_Proofs.pdf
Operating Systems - Kernel/Drivers Development
- Linux_Device_Drivers.pdf
- Linux_device_driver_tutorial.pdf
- Linux_Kernel_Development-3rdEd-2010-Love.pdf
- Understanding_the_Linux_kernel-3rdEd-2005-Bovet.pdf
- Professional_Linux_Kernel_Architecture.pdf
- The_Linux_Kernel_Module_Programming_Guide-4.15.2.pdf
- linux-kernel-slides.pdf
Networking Fundamentals -Theory
- Computer_Networks-5thEd-2011-Tanenbaum.pdf
- computer_network_5th_solutions.pdf
- Startpage.com - The world's most private search engine
- TCPIP.pdf
- The_TCPIP_Guide-2005.pdf
- TCPIP_Architecture_Design_and_Implementation_in_Linux-2008.pdf
- TCPIP_Illustrated-Volume_1-2ndEdition.pdf
- Understanding_TCPIP.pdf
- Packet_Guide_to_Routing_and_Switching.pdf
- Startpage.com - The world's most private search engine
- Distributed_Networks-Intelligence_Security_and_Applications-2014.pdf
- Distributed_Systems_Principles_and_Paradigms.pdf
- Startpage.com - The world's most private search engine
- Fundamentals_of_Cellular_Network_Planning_and_Optimisation.pdf
- Rolling_Out_5G.pdf
- Software_Networks-Virtualization_SDN_5G_Security.pdf
- Mobile_Radio_Networks-2ndEdition.pdf
- Mobile_Communication_Systems.pdf
- Home_Networking_For_Dummies-4thEdition.pdf
- Networking_All-in-One_For_Dummies-6thEdition.pdf
- Signaling_System_7-6thEd.pdf
- Mobile_Radio_Networks-2ndEdition.pdf
- Startpage.com - The world's most private search engine
- Beginning_NFC-2014.pdf
- RFID_Handbook_3rdEdition-2010.pdf
- Startpage.com - The world's most private search engine
- Foundations_of_Python_Network_Programming-3rdEdition-2014.pdf
- Python_Network_Programming_Cookbook-2014.pdf
IoT - Robotics - Artificial Intelligence
- Building_Embedded_Systems.pdf
- Designing_the_Internet_of_Things-2014.pdf
- Memory_Allocation_Problems_in_Embedded_Systems-Optimization_Method.pdf
- Embedded_Firmware_Solutions.pdf
- Embedded_Systems_Architecture_for_Agile_Development.pdf
- Making_Embedded_Systems.pdf
- Mastering_Embedded_Linux_Programming.pdf
- Startpage.com - The world's most private search engine
- Computer_System_Design_System-on-Chip.pdf
- Micro_Nanosystems_and_Systems-on-Chips.pdf
- Smart_Card_Handbook-4thEdition.pdf
- Startpage.com - The world's most private search engine
- Real-Time_Cpp-2ndEd-2015.pdf
- Electronics_Cookbook-2017.pdf
- Learning_Computer_Architecture_with_Raspberry_Pi-2016-Eben_Upton.pdf
- RaspberryPi_for_Secret_Agents.pdf
- Arduino_for_Secret_Agents.pdf
- Startpage.com - The world's most private search engine
- Artificial_Intelligence_A_Modern_Approach-3rdEd-2010-Russel-Norvig.pdf
- Intelligent_Systems-A_Modern_Approach.pdf
- Theoretical_Foundations_of_Artificial_General_Intelligence.pdf
- The_Master_Algorithm.pdf
- Emotion-Oriented_Systems.pdf
- Social_Machines.pdf
- Startpage.com - The world's most private search engine
- Neural_Networks_for_Electronics_Hobbyists.pdf
- Neural_Networks_and_Computing.pdf
- Advances_in_Neural_Networks_Computational_and_Theoretical_Issues.pdf
- Complex-Valued_Neural_Networks_Advances_and_Applications.pdf
- Machine_Learning_For_Dummies.pdf
- Agile_Machine_Learning.pdf
- Machine_Learning_Systems.pdf
- Designing_Machine_Learning_Systems_with_Python.pdf
- How_to_spot_a_machine_learning_opportunity.pdf
- Fundamentals_of_Deep_Learning.pdf
- Deep_Learning.pdf
- Startpage.com - The world's most private search engine
- Learning_Robotics_using_Python-2015.pdf
- Beginning_Artificial_Intelligence_with_the_RaspberryPi-2016.pdf
- Raspberry_Pi_Robotic_Blueprints.pdf
- Arduino_Robotic_Projects-2014.pdf
- Startpage.com - The world's most private search engine
- Designing_Bots-2017.pdf
- Beginning_AI_Bot_Frameworks.pdf
- The_Intelligent_Web.pdf
- Neural%20Networks%20for%20Electronics%20Hobbyists.pdf
Cryptocurrency - Blockchain
- Bitcoin-A_Peer-to-Peer_Electronic_Cash_System-2009-Satoshi_Nakamoto.pdf
- Startpage.com - The world's most private search engine
- Bitcoin_Essentials-2016-Smigielski.pdf
- Learning_Bitcoin.pdf
- Beginning_Blockchain-2018-Singhal_Dhameja_Panda.pdf
- Startpage.com - The world's most private search engine
- Decentralized_Applications-Harness_Blockchain_Tech-2016-Raval.pdf
- The_Blockchain_Developer.pdf
- Mastering_Bitcoin-Programming_The_Open_Blockchain-2ndEd-2017-Antonopoulos.pdf
Quantum Computing
- Quantum_Computing_since_Democritus-Aaronson-2013.pdf
- The_Secret_Life_of_Programs-Steinhart-2019.pdf
- 1.Intro_to_quantum_computing_for_non-physicits-Rieffel_pollack.pdf
- 2.quantum_tutorial.pdf
- 3.qc_for_beginners.pdf
- 4.IntroductionQuantumCircuits.pdf
- 5.Algorithmique_quantique.pdf
- 6.Algo_Quant.pdf
- 7.mcharemza_quant_comp.pdf
- 8.Ordinateurs_quantiques_reves_realites-Raimond.pdf
- Intro_Quantum_Algos_Shor.pdf
- Les%20%20algorithmes%20quantiques.pdf
- quantum.pdf
- SizemoreTalk.pdf
Sessions
CODING CHALLENGES
- firstDuplicate | CodeSignal
- Coding Tests and Assessments for Technical Hiring | CodeSignal
- Dashboard | HackerRank
- Programming Online Training In Coding Skills | Codility - Codility
- Request a Demo | Remote Online Code Testing | Codility
- CodinGame for Work - Create new account and start sourcing
- Burst Balloons - LeetCode
- LintCode
- Achieve mastery through challenge | Codewars
- InterviewBit: Coding Interview Questions
- GeeksforGeeks | A computer science portal for geeks
- Warning: Potential Security Risk Ahead
- Timus Online Judge
- Codeforces
- Startpage.com - The world's most private search engine
- GitHub - RodneyShag/HackerRank_solutions: 317 efficient solutions to HackerRank problems
- GitHub - gzc/CLRS: Solutions to Introduction to Algorithms
- algorithms - Is there a difference between top-down and bottom-up dynamic programming? - Computer Science Stack Exchange
- Tabulation vs Memoization - GeeksforGeeks
- Dynamic Programming vs Divide-and-Conquer - GeeksforGeeks
CONFIG - SMART HOME - TV
- How to Install Android on a Raspberry Pi
- device_brcm_rpi3/start.elf at nougat-tablet · android-rpi/device_brcm_rpi3 · GitHub
- How to Manually Install or Sideload Apps on Android
- Android Pie on RPi 3B(+) with hardware acceleration - Raspberry Pi Forums
- How to Install Android TV in Raspberry Pi 3 - Make Tech Easier
- How to finally Install Android on your Raspberry Pi? [Complete Guide] – Raspberry tips
- How to Make a Raspberry Pi Android TV Box
- 7 Amazing Android TV Tricks You Definitely Didn’t Know About
- 8 Great Browsers You Can Run on Your Raspberry Pi 3
- What's the Best Browser for Android TV? 5 Top Apps, Ranked
- [HowTo!] Smooth youtube 1080p in Chromium - Raspberry Pi Forums
- Startpage.com - The world's most private search engine
- How to Choose and Optimise Your Raspberry Pi Browser
- The 5 Best Raspberry Pi Smart TV Projects We've Seen
- How to Make Your Own DIY Chromecast With a Raspberry Pi
- How to use your Raspberry Pi as a Chromecast alternative - The Pi
- Raspberry Pi Media Center: How to Install Kodi on Raspbian
- Raspberry Pi - Official Kodi Wiki
- A simple change may vastly improve your Raspberry Pi Kodi performance
- LibreELEC, OpenELEC or OSMC - What's The Best OS for Me?
CONFIG C/C++ EMACS IDE
- C/C++ Development Environment for Emacs
- Emacs Mini Manual (PART 3) - CUSTOMIZING AND EXTENDING EMACS
- GitHub - leoliu/ggtags: Emacs frontend to GNU Global source code tagging system.
- EmacsWiki: Cc Mode
- GitHub - tuhdo/emacs-c-ide-demo: Emacs setup for C/C++ with Helm describe here: http://tuhdo.github.io/c-ide.html
CONFIG PYTHON EMACS IDE
- EmacsWiki: Python Programming In Emacs
- Jedi.el - Python auto-completion for Emacs — Emacs Jedi 0.2.0alpha2 documentation
- Emacs: The Best Python Editor? – Real Python
- YouTube
CONFIG SYSADMIN - HOME LAB
- ESXi Free vs Paid - What are the differences? | ESX Virtualization
- The Top 5 Enterprise Type 1 Hypervisors You Must Know
- Which is better for virtualization - VMware or VirtualBox? - Quora
- Hack Like a Pro: How to Create a Virtual Hacking Lab « Null Byte :: WonderHowTo
- How to Use SecGen to Generate a Random Vulnerable Machine « Null Byte :: WonderHowTo
- Chapter 6. Virtual Networking
- How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell « Null Byte :: WonderHowTo
- access virtualbox vm from lan at DuckDuckGo
- virtualbox - How to allow other computers on the network to access my virtual web server? - Super User
- networking - Network access to VirtualBox VM from Network PCs - Super User
- How to access a VirtualBox VM guest through the internet remotely | Tom's Hardware Forum
- How do I install Guest Additions in a VirtualBox VM? - Ask Ubuntu
- VirtualBox Guest Additions Installation In Ubuntu, Linux Mint, Debian, Fedora And openSUSE [How-To] - Linux Uprising Blog
- VirtualBox - ArchWiki
- VirtualBox Network Settings: All You Need to Know
- Puppy Linux - Wikipedia
- Puppy Linux Installation and Usage
- HOWTO: Create a bootable Linux Media using the dd Command - Toolbox
- Startpage.com - The world's most private search engine
- virtualbox.org • View topic - Virtual USB memory stick drive
- How to add a "virtual" USB storage online to a running VirtualBox guest? - Super User
- How to Mount USB Drives on VirtualBox - DZone Integration
- Master boot record - Wikipedia
- Extended boot record - Wikipedia
- GUID Partition Table - Wikipedia
- Amiga rigid disk block - Wikipedia
- Disk partitioning - Wikipedia
- System partition and boot partition - Wikipedia
- Booting - Wikipedia
- Partition - Debian Wiki
- Partitioning - ArchWiki
- Swap - ArchWiki
- Partitioning - ArchWiki
- Arch boot process - ArchWiki
- Preparing the disks - Gentoo Wiki
- Primary Partition VS. Logical Drive: Their Exact Features
- What is the difference between Primary and logical partition? - Quora
- hard drive - What are the differences between primary and logical partition? - Super User
- An Easy Way to Set Partition as Active or Inactive with MiniTool
- Primary vs Logical partition - Unix & Linux Stack Exchange
- What is the Difference Between Primary/Extended Partition and Logical Drive?
- Ubuntu installation partitioning: Logical or primary? - Ask Ubuntu
- Primary Partition, Logical Partition and Extended Partition (Disk Partition Basic)
- What is a Partition?
- What is a Logical Partition?
- hard drive - Which is better for keeping data: primary partition or logical partition? - Super User
- What is Boot?
- What is a Bootable Disk?
CONFIGS SYSADMIN
- opensource.com/life/16/11/running-commands-shutdown-linux
- SysVinit - ArchWiki
- shutdown - How to run a command before the machine automatically shuts down? - Ask Ubuntu
- run levels in linux at DuckDuckGo
- Linux Changing Run Levels - nixCraft
- Debian and Ubuntu Linux Run Levels | Debian Admin
- Run levels
- Runlevel - Wikipedia
- How To Use Systemctl to Manage Systemd Services and Units | DigitalOcean
- linux date formatting for use in script at DuckDuckGo
- How To Format Date For Display or Use In a Shell Script - nixCraft
- Allow non-admin users to mount drives via nautilus - Ask Ubuntu
- authentication - Stop Ubuntu asking for password to mount second drive - Ask Ubuntu
- debian - Make Nautilus mount USB so unprivileged user can write to it - Super User
- linux - Prevent gnome from automatically mounting partition when clicked in nautilus - Super User
- partitioning - Why am I asked for my password when I want to mount a drive - Ask Ubuntu
- Prograstinator: Nutch + Solr for a local filesystem search engine
- lucidworks.com/2009/03/09/nutch-solr/
- IntranetDocumentSearch - NUTCH - Apache Software Foundation
- Scraping the Web with Nutch for Elasticsearch
- Apache Nutch - Wikipedia
- Apache Solr - Wikipedia
- Open Semantic Search: Your own search engine for documents, images, tables, files, intranet & news
- What is the difference between web crawler and search engine? - Quora
- Data Scraping vs. Data Crawling | Promptcloud
- What are the biggest differences between web crawling and web scraping? - Quora
CONFIGS SYSADMIN - MIGRATION
- Startpage.com - The world's most private search engine
- DIY: Build a Custom Minimal Linux Distribution from Source | Linux Journal
- Migrate Your Linux Installation Between Machines
- New Computer, Old OS: How To Migrate Linux Between Machines
- Migrate installation to new hardware - ArchWiki
- drivers - Moving linux install to a new computer - Unix & Linux Stack Exchange
- backup - How to migrate the whole system to a new machine? - Ask Ubuntu
- How To Migrate Linux Servers Part 1 - System Preparation | DigitalOcean
CRYPTOCURRENCIES & BLOCKCHAINS
- bitcoin.pdf
- Bitcoin Wiki
- Bitcoin and cryptocurrency algorithms and implementation tutorial. | Toptal
- Satoshi Nakamoto - Wikipedia
- Startpage.com - The world's most private search engine
- List of cryptocurrencies - Wikipedia
- The Bitcoin Lightning Network Explained | Toptal
- Ethereum vs Bitcoin: What are the Differences & Which is Better?
- Cryptocurrency exchange - Wikipedia
- How to Build a Cryptocurrency Exchange App | by Pratik Rupareliya | The Startup | Medium
- 1 new message
- How to set up your own cryptocurrency exchange - Quora
- how to buy bitcoin without using an exchange at DuckDuckGo
- 5 Ways to Buy Bitcoin Without Verification or ID Anonymously
- marketplace - Where Can i Buy Bitcoins without using exchange? - Bitcoin Stack Exchange
- YouTube
- ImponderableThings (Scott Driscoll's Blog): The Essence of How Bitcoin Works (Non-technical)
- ImponderableThings (Scott Driscoll's Blog): How Bitcoin Works Under the Hood
- How the Bitcoin protocol actually works | DDI
- Blockchain - Wikipedia
- Distributed ledger - Wikipedia
- What Does Cryptocurrency Have to Do With Blockchain Anyway?
- TR_EB_blockchain_final2.pdf
- How to Build Your Own Blockchain Part 1 — Creating, Storing, Syncing, Displaying, Mining, and Proving Work | Big-Ish Data
- How blockchain will reduce the cost of running an open organization | Opensource.com
- Don't Use a Blockchain Unless You Really Need One - CoinDesk
- Decentralization is blockchain's USP
- blockchain vs database at DuckDuckGo
- ledger vs blockchain at DuckDuckGo
- Majority attack - Bitcoin Wiki
- Flood attack - Bitcoin Wiki
- Storing bitcoins - Bitcoin Wiki
- Double-spending - Wikipedia
- Proof of work - Wikipedia
- explanation of satoshi nakamoto paper at DuckDuckGo
- The Bitcoin White Paper Explained
- Bitcoin White Paper for normal people! | by Wan Raitelli | Medium
- Server Not Found
- Satoshi Nakamoto’s Bitcoin Whitepaper: A thorough and straightforward walk-through
- The Bitcoin White Paper Explained, What you NEED to Know!
DEV PROJECTS
- 9. Classes | Perforce
- CppCoreGuidelines/CppCoreGuidelines.md at master · isocpp/CppCoreGuidelines · GitHub
- Summary of 'Clean code' by Robert C. Martin · GitHub
- Server Not Found
- Standard C++
- stroustrup.com/bs_faq2.html
- hardcodet.net » An Introduction to SLF, the Simple Logging Façade
- Logging In C++: Part 2 | Dr Dobb's
- A Lightweight Logger for C++ | Dr Dobb's
- GitHub - PlatformLab/NanoLog: Nanolog is an extremely performant nanosecond scale logging system for C++ that exposes a simple printf-like API.
- Which design pattern would you consider when Logging is needed? - Stack Overflow
- c++ - How do I implement convenient logging without a Singleton? - Stack Overflow
- design patterns - Why we should consider the «Logger» class as a singleton? - Stack Overflow
- CS635: Doc 6, Logging: A Use of Singleton
- Copy assignment operator - cppreference.com
- c++ - What is the copy-and-swap idiom? - Stack Overflow
- c++ - What is The Rule of Three? - Stack Overflow
- Using Hamcrest for testing - Tutorial
- GitHub - jlangr/c2: Chapter First Example
- GitHub - google/googletest: Googletest - Google Testing and Mocking Framework
- googletest/googletest at master · google/googletest · GitHub
- googletest/primer.md at master · google/googletest · GitHub
- googletest/README.md at master · google/googletest · GitHub
- Google Test and Google Mock. Google Test and Google Mock are popular… | by Phil Wright | FoxGuard Development | Medium
- Introduction to Google Mock
- cmake-buildsystem(7) — CMake 3.15.7 Documentation
- FAQ · Wiki · CMake / Community · GitLab
- GoogleTest · Modern CMake
- CMake Tutorial. I have read numerous documentations and… | by Onur Dündar | Medium
- CMake-Cheatsheet/CMake_Cheatsheet.pdf at master · mortennobel/CMake-Cheatsheet · GitHub
- CMake Cheat Sheet | OverAPI.com
- CMake - Cross Platform Make
- CMake stuff i wish i knew earlier
- Cmake cheat sheet
- Hello CMake! - Simplify C++!
- Cpputest
- GitHub - cpputest/cpputest: CppUTest unit testing and mocking framework for C/C++
- c++ - GoogleTest vs CppUnit: The facts - Stack Overflow
- Test-driven development and unit testing with examples in C++
- c++ - Adding multiple executables in CMake - Stack Overflow
- building multiple targets in cmake at DuckDuckGo
- How can I build multiple targets using cmake --build - Stack Overflow
- Startpage.com - The world's most private search engine
- c++ - Does set_target_properties in CMake override CMAKE_CXX_FLAGS? - Stack Overflow
- cmake - Changing CMAKE_CXX_FLAGS in project - Stack Overflow
- [CMake] Different CMAKE_CXX_FLAGS for different executables
- [CMake] Replacing compiler flags for certain project subdirectories
- visual studio 2008 - CMake: defining link directories and libraries for different build targets - Stack Overflow
- Page not found - Stack Overflow
- target_compile_options — CMake 3.18.1 Documentation
- target_include_directories — CMake 3.18.1 Documentation
- target_link_libraries — CMake 3.0.2 Documentation
- What is the modern method for setting general compile flags in CMake? - Stack Overflow
- c++ - How do I add a linker or compile flag in a CMake file? - Stack Overflow
- c++ - Debug vs Release in CMake - Stack Overflow
- cmake-generator-expressions(7) — CMake 3.3.2 Documentation
- Running CMake · Modern CMake
- target_link_directories — CMake 3.18.20200807-g2f97d5a Documentation
- Some notes on CMake variables and scopes — Matthew Gaudet
ENTREPRENEUR STUFFS
- Gmail : la messagerie de Google
- MyProcurement : Lutte contre le travail dissimulé : Accueil
- Google Drive : connexion
- Hiscox Direct
- comparateur assurance rcp at DuckDuckGo
- Devis responsabilité civile professionnelle | LeLynx.fr
- comprendre les franchises d'assurance rcp - Google Search
- Numéro de TVA intracommunautaire - professionnels | service-public.fr
- Modèle : Demande d'attribution d'un numéro de TVA intracommunautaire à un assujetti non redevable | service-public.fr
- Upwork Help
- Value Added Tax (VAT) – Upwork Help
- VAT identification number - Wikipedia
- Professionnel | authentification
- La déclaration des auto-entrepreneurs - Erreur
- microentrepreneur comment payer ses impots sur gouv impot - Google Search
- Déclaration impôt auto-entrepreneur 2018
- Micro-entrepreneurs : comment déclarer vos revenus ? | economie.gouv.fr
- Comment déclarer les revenus provenant de mon activité de micro-entrepreneur ? | impots.gouv.fr
HARDWARE PURCHASE
- is a gaming laptop suitable for hacking at DuckDuckGo
- How to Hack Wi-Fi: Choosing a Wireless Adapter for Hacking « Null Byte :: WonderHowTo
- compatible_cards [Aircrack-ng]
- faq [Aircrack-ng]
- How to Select a Field-Tested Kali Linux Compatible Wireless Adapter « Null Byte :: WonderHowTo
- Buy the Best Wireless Network Adapter for Wi-Fi Hacking in 2019 « Null Byte :: WonderHowTo
- Home
- Asus TUF Gaming laptops blend AMD Ryzen CPUs with Nvidia 16 Series graphics | Trusted Reviews
- The best CPU for gaming | PC Gamer
- ROG Strix GL702ZC | ROG - Republic Of Gamers | ASUS USA
- Top 10 Best Laptop for Hacking in 2020 - Sysprobs
- Buying a professional penetration testing laptop for 2017 | by Andrew Douma | Medium
- Product Review: Best Hacking Laptops for 2017 - YouTube
- Minimum Requirements of a Laptop to Be Used for Hacking « Null Byte :: WonderHowTo
- How to Stay Anonymous While RATting (Level: Paranoid) « Null Byte :: WonderHowTo
- What are the best laptops for hacking? - Quora
- Razer Gaming Laptops and Ultrabook - Blade, Blade Stealth, and Blade Pro | Razer Europe
- GPU-Based Cracking: AMD Vs. Nvidia In Brute-Force Attack Performance - Wi-Fi Security: Cracking WPA With CPUs, GPUs, And The Cloud | Tom's Hardware
- how to buy security oriented laptop at DuckDuckGo
- best hacking laptop 2019 at DuckDuckGo
- Which are The Most Secure Laptops (Notebooks) in 2017
- This is the most secure computer you’ll ever own | The Verge
- Beautiful, Secure, Privacy-Respecting Laptops & Phones – Purism
- Where would you buy a secure laptop? - Quora
- Best Laptops For Hacking in 2020: laptops for cyber security | Compsmag
- Best Laptops for Hacking 2020 (Ultimate Buyer's Guide)
- MSI Global English Forum - Index
- Which laptop configuration should I buy to learn ethical hacking? - Quora
- GeForce GTX 1080 vs GeForce GTX 1660 Ti – Hardware Compare: Graphics Cards, CPU & SSD Comparison
- gtx 1080 vs 1660 ti at DuckDuckGo
- Ryzen 5 2600 vs. Ryzen 7 2700, 6 or 8-cores for Gaming? : Amd
- Ryzen 7 vs Ryzen 5 for Gaming and Other | Tom's Hardware Forum
- How Much Video Memory (VRAM) Do you need for Gaming in 2020?
- 4GB, 8GB Or 16GB: How Much RAM Do You Need?
- best ram amount for gaming at DuckDuckGo
- ideal ram for gaming at DuckDuckGo
INTERVIEW CODING-ALGORITHMICS PREP
- Programming - InterviewBit
- LeetCode - The World's Leading Online Programming Learning Platform
- LintCode 领扣
- HackerRank
- Coding Tests and Assessments for Technical Hiring | CodeSignal
- Coding Games and Programming Challenges to Code Better
- codeforces.com/
- 1. Iterations lesson - Learn to Code - Codility
- GeeksforGeeks | A computer science portal for geeks
- Programming Problems grouped by Company & Topic Tags | Practice | GeeksforGeeks
- Startpage.com - The world's most private search engine
- glassdoor.co.in/Interview/You-will-be-supplied-with-two-data-files-in-CSV-format-The-first-file-contains-statistics-about-various-dinosaurs-The-se-QTN_2088069.htm
- I just got a developer job at Facebook. Here’s how I prepped for my interviews.
- Top 10 Algorithms for Coding Interview
- Top 10 algorithms in Interview Questions - GeeksforGeeks
- hackernoon.com/top-20-searching-and-sorting-algorithms-interview-questions-5a476121fd0f
- The 30-minute guide to rocking your next coding interview
- How To Approach Any Algorithm Interview Without Panicking
- Choosing a Programming Language for Interviews & Jobs
- Preparing for your Software Engineering Interview at Facebook | Facebook Careers
- Standard C++
- Super-FAQ : Standard C++
- Modern C++ for C programmers -- bert hubert : Standard C++
- CppCoreGuidelines/CppCoreGuidelines.md at master · isocpp/CppCoreGuidelines · GitHub
- List of data structures - Wikipedia
- Abstract data type - Wikipedia
INTERVIEW CRYPTOGRAPHY / PRIVACY / ANONYMITY PREP
- github.com/AnarchoTechNYC/meta/wiki/InfoSec
- github.com/onlurking/awesome-infosec/blob/master/readme.md
- github.com/fffaraz/awesome-cpp#cryptography
- en.wikipedia.org/wiki/Outline_of_cryptography
- seedsecuritylabs.org/Labs_16.04/Crypto/
- seedsecuritylabs.org/Labs_16.04/Crypto/Crypto_MD5_Collision/
- PDF.js viewer
- startpage.com/
- crypto.stackexchange.com/questions/66162/if-kerckhoffs-principle-holds-why-do-we-need-a-cipher-at-all
- en.wikipedia.org/wiki/Cryptographic_primitive
- en.wikipedia.org/wiki/Cryptographic_protocol
- crypto.stackexchange.com/questions/39735/whats-a-cryptographic-primitive-really
- en.wikipedia.org/wiki/Information-theoretic_security
- What is perfect secrecy? - Cryptography Stack Exchange
- crypto.stackexchange.com/questions/3896/simply-put-what-does-perfect-secrecy-mean
- en.wikipedia.org/wiki/Semantic_security
- en.wikipedia.org/wiki/Ciphertext_indistinguishability
- crypto.stackexchange.com/questions/20916/how-can-a-cryptosystem-be-unconditionally-secure
- crypto.stackexchange.com/questions/67194/whats-the-difference-between-perfect-security-and-unconditional-security
- crypto.stackexchange.com/questions/70453/what-is-the-relation-between-computational-security-and-provable-security
- PDF.js viewer
- en.wikipedia.org/wiki/Provable_security
- crypto.stackexchange.com/questions/63478/what-conditions-does-a-provable-secure-cryptosystem-satisfy
- crypto.stackexchange.com/questions/10918/how-to-prove-the-security-of-the-prng
- en.wikipedia.org/wiki/Forward_secrecy
- en.wikipedia.org/wiki/Forward_anonymity
- en.wikipedia.org/wiki/One-time_pad
- en.wikipedia.org/wiki/List_of_cryptographers
- en.wikipedia.org/wiki/Cryptography
- en.wikipedia.org/wiki/Cryptovirology
- math.stackexchange.com/questions/35381/is-every-encryption-a-bijective-function
- duckduckgo.com/?q=homomorphic+encryption+wiki&t=ffab&ia=web
- en.wikipedia.org/wiki/Homomorphic_encryption
- crypto.stackexchange.com/questions/292/how-does-asymmetric-encryption-work
- crypto.stackexchange.com/questions/71836/can-a-public-key-be-same-as-private-key
- implementation - In RSA, how does the CPU deal with this huge modulus (8192 bits)? - Cryptography Stack Exchange
- crypto.stackexchange.com/questions/15382/hmac-sha1-vs-hmac-sha256
- crypto.stackexchange.com/questions/5646/what-are-the-differences-between-a-digital-signature-a-mac-and-a-hash
- crypto.stackexchange.com/questions/40757/key-derivation-functions-kdf-what-are-main-purposes-how-can-they-be-used
- paragonie.com/blog/2015/09/how-to-safely-implement-cryptography-in-any-application
- crypto.stackexchange.com/questions/54082/in-end-to-end-encryption-doesnt-the-server-need-to-be-trusted
- crypto.stackexchange.com/questions/68648/about-integer-factorization
- crypto.stackexchange.com/questions/10590/what-makes-rsa-secure-by-using-prime-numbers
- en.wikipedia.org/wiki/Public-key_cryptography
- crypto.stackexchange.com/questions/2884/rsa-proof-of-correctness
- cryptanalysis - How long does it take to crack RSA 1024 with a PC? - Cryptography Stack Exchange
- en.wikipedia.org/wiki/Cryptographic_hash_function
- en.wikipedia.org/wiki/Hash_function
- crypto.stackexchange.com/questions/63339/how-do-hashes-really-ensure-uniqueness
- crypto.stackexchange.com/questions/70877/is-a-hash-a-zero-knowledge-proof
- crypto.stackexchange.com/questions/2936/hmac-vs-mac-functions
- crypto.stackexchange.com/questions/26336/sha512-faster-than-sha256
- crypto.stackexchange.com/questions/20997/second-pre-image-resistance-vs-collision-resistance
- crypto.stackexchange.com/questions/29601/perfect-hash-function
- crypto.stackexchange.com/questions/3216/signatures-rsa-compared-to-ecdsa
- crypto.stackexchange.com/questions/5458/should-we-sign-then-encrypt-or-encrypt-then-sign
- crypto.stackexchange.com/questions/71029/are-dsa-and-ecdsa-provably-secure-assuming-dl-security
- crypto.stackexchange.com/questions/20/what-are-the-practical-differences-between-256-bit-192-bit-and-128-bit-aes-enc
- crypto.stackexchange.com/questions/46559/what-are-the-chances-that-aes-256-encryption-is-cracked
- crypto.stackexchange.com/questions/68163/why-does-the-signal-protocol-use-aes-cbc-instead-of-aes-gcm
- crypto.stackexchange.com/questions/34929/to-what-extent-is-whatsapps-statement-on-secure-messaging-realistic
- crypto.stackexchange.com/questions/58443/if-whatsapp-cannot-read-our-message-how-can-the-media-forwarding-happen-in-an-i
- crypto.stackexchange.com/questions/9926/what-is-the-shared-secret-used-for-in-ipsec-vpn
- crypto.stackexchange.com/questions/8933/how-can-i-use-ssl-tls-with-perfect-forward-secrecy
- en.wikipedia.org/wiki/Cryptanalysis
- security.stackexchange.com/questions/61687/crack-unknown-encryption
- crypto.stackexchange.com/questions/6752/how-would-one-crack-a-weak-but-unknown-encryption-protocol
- crypto.stackexchange.com/questions/3826/possible-ways-to-crack-simple-hand-ciphers
- en.wikipedia.org/wiki/Quantum_cryptography
- en.wikipedia.org/wiki/Post-quantum_cryptography
- quantumcomputing.stackexchange.com/questions/2343/is-quantum-cryptography-safer-than-classical-cryptography
- crypto.stackexchange.com/questions/68971/can-shors-algorithm-factor-multi-prime-numbers
INTERVIEW SOFTWARE SYSTEM DESIGN TECHNICAL PREP
- Page introuvable
- GitHub - checkcheckzz/system-design-interview: System design interview for IT companies
- System Design - InterviewBit
- 5 traits of good systems architecture | Opensource.com
- Top 10 System Design Interview Questions for Software Engineers | Hacker Noon
- Crack the System Design interview: tips from a Twitter software engineer
- Top 27 Expert System Freelancers for Hire In August 2020 - Upwork
- What system design, distributed systems, and scalability topics should I study, in order to be adequately prepared for a Google software engineer interview? - Quora
- System Design Cheatsheet · GitHub
- 15+ Ultimate Software Architecture Interview Questions (ANSWERED) | FullStack.Café
- What are some dead giveaways that someone is a 10X software engineer/developer just by looking at their code? - Quora
- 7 Ways to Get Better at C++ During this Summer - Fluent C++
- ✅ Every time you build a to-do list app, a puppy ? dies ?
- Startpage.com - The world's most private search engine
- Stripe API Reference
- API libraries
- Documentation
- build statistics dashboard web app at DuckDuckGo
- build statistics dashboard web app stripe at DuckDuckGo
- Build a realtime payment dashboard with Stripe
- How to Integrate Stripe Payments in Web Application? | Hacker Noon
- Create a Python powered dashboard in under 10 minutes
- Dash Documentation & User Guide | Plotly
- Building a Serverless Stripe Analytics Dashboard | Cube.js Blog
- how to build a rss feed reader at DuckDuckGo
- How APIs work — An Analogy For Dummies | by Timothy Choi | Medium
- Representational state transfer - Wikipedia
- http - What exactly is RESTful programming? - Stack Overflow
- What happens when you type a URL in the browser and press enter? | by Maneesha Wijesinghe | Medium
- RFC 7231 - Hypertext Transfer Protocol (HTTP/1.1): Semantics and Content
- RFC 7540 - Hypertext Transfer Protocol Version 2 (HTTP/2)
- HTTP/2: the difference between HTTP/1.1, benefits and how to use it | by Factory.hr | Medium
- HTTP/1.1 vs HTTP/2: What's the Difference? | DigitalOcean
- tcp - What is the difference between HTTP 1.1 and HTTP 2.0? - Stack Overflow
- HTTP/2 - Wikipedia
- What Happens When You Type a Url in Your Browser and Press Enter - DEV
- libcurl internals - Everything curl
- Laravel API Tutorial: Building & Testing a RESTful API | Toptal
- RESTful API Security - DZone Integration
- What is REST?
- Can anyone refer a penetration & security testing tool for RESTful API? - Quora
- Bill Sempf | Cracking and Fixing REST APIs
- RESTful API Best Practices and Common Pitfalls | by Spencer Schneidenbach | Medium
- Top 5 REST API Security Guidelines
- ruby for client side web at DuckDuckGo
- Ruby: client-side or server-side? - Stack Overflow
- A mobile, desktop and website App with the same code | by Benoit VALLON | Medium
- python vs ruby web development at DuckDuckGo
- Python vs. Ruby: Which is best for web development? | Opensource.com
- Python Vs. Ruby: Which Is Better For Web Development? | by Amit Ashwini | The Startup | Medium
- python vs ruby resful api at DuckDuckGo
- Django (web framework) - Wikipedia
- Web framework - Wikipedia
- What is the best JavaScript framework to use to build a web app? - Quora
- `Top 3 Best JavaScript Frameworks for 2019 | by Cuelogic Technologies | Cuelogic Technologies | Medium
- jQuery vs React vs Vue.js | What are the differences?
- Vue.js vs jQuery: Use Cases and Comparison with Examples ― Scotch.io
- jQuery - Wikipedia
- Which is the best javascript framework for beginners? - Hashnode
- Which JavaScript Framework Should You Learn First? - Skillcrush
- JS Frameworks: A brief overview. Before coming to the list of frameworks… | by Prashant kumar | Beginner's Guide to Mobile Web Development | Medium
- The Noob’s Guide to Choosing a JavaScript Framework
- Which is the best Javascript Framework for beginners? - Quora
- What is the best frontend framework for beginners ? : javascript
- You SHOULD Learn Vanilla JavaScript Before JS Frameworks - Snipcart
- You shouldn't focus on learning JavaScript frameworks - DEV
- Top 10 List of JavaScript Libraries and Frameworks to Learn in 2020
- Which one is better node vs angular vs react? - Quora
- AngularJS vs Nodejs vs ReactJS: Which One Would You Choose?
- ECMAScript - Wikipedia
- TypeScript - Wikipedia
INTERVIEW APP SECURITY PREP
- awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
- InfoSec · AnarchoTechNYC/meta Wiki · GitHub
- GitHub - infoslack/awesome-web-hacking: A list of web application security
- GitHub - devsecops/awesome-devsecops: An authoritative list of awesome devsecops tools with the help from community experiments and contributions.
- GitHub - secfigo/Awesome-Fuzzing: A curated list of fuzzing resources ( Books, courses - free and paid, videos, tools, tutorials and vulnerable applications to practice on ) for learning Fuzzing and initial phases of Exploit Development like root cause analysis.
- Application security - Wikipedia
- Application Security Wiki
- resources.infosecinstitute.com/category/application-security-2/
- cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
- Download Microsoft Threat Modeling Tool 2016 from Official Microsoft Download Center
- cheatsheetseries.owasp.org/cheatsheets/Attack_Surface_Analysis_Cheat_Sheet.html
- Threat model | Surveillance Self-Defense
- 02_what_is_security.pdf
- cheatsheetseries.owasp.org/
- Code injection - Wikipedia
- SQL injection - Wikipedia
- What happens when you type a URL in the browser and press enter? | by Maneesha Wijesinghe | Medium
- seedsecuritylabs.org/Labs_16.04/Web/
- seedsecuritylabs.org/Labs_16.04/Web/Web_SQL_Injection/
- SQL_Injection.pdf
- Chapter 6. Virtual Networking
- youtube.com/watch?v=_P8HCLkDInA&feature=youtu.be
- cis.syr.edu/~wedu/education/websec3.html
- cheatsheetseries.owasp.org/cheatsheets/SQL_Injection_Prevention_Cheat_Sheet.html
- Web application firewall - Wikipedia
- Complete Web Application Firewall Guide | by rezaduty | devconnected — DevOps, Sysadmins & Engineering | Medium
- How do I test for SQL injection vulnerabilities on a site with input fields? - Information Security Stack Exchange
- sql injection - Is it possible to detect 100% of SQLi with a simple regex? - Information Security Stack Exchange
- web application - SQL injection is 17 years old. Why is it still around? - Information Security Stack Exchange
- How can I explain SQL injection without technical jargon? - Information Security Stack Exchange
- penetration test - Is single quote filtering nonsense? - Information Security Stack Exchange
- cheatsheetseries.owasp.org/cheatsheets/Cross-Site_Request_Forgery_Prevention_Cheat_Sheet.html
- IntroSecureCoding
- How are Stripe merchants able to avoid PCI compliance requirements even though they capture the card details on their own checkout page? - Quora
- How is the Stripe payment method PCI compliant? - Quora
- A guide to PCI compliance
- GitHub - gurugio/lowlevelprogramming-university: How to be low-level programmer
- GitHub - tylerha97/awesome-reversing: A curated list of awesome reversing resources
- Mobile security - Wikipedia
- GitHub - ashishb/android-security-awesome: A collection of android security related resources
- root access - What is the difference between: Rooting, Jailbreak, ROM, Mod, etc.? - Android Enthusiasts Stack Exchange
- GitHub - OWASP/owasp-mstg: The Mobile Security Testing Guide (MSTG) is a comprehensive manual for mobile app security development, testing and reverse engineering.
- GitHub - iosre/iOSAppReverseEngineering: The world’s 1st book of very detailed iOS App reverse engineering skills :)
INTERVIEW NETWORK / SYSTEMS SECURITY TECHNICAL PREP
- awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
- InfoSec · AnarchoTechNYC/meta Wiki · GitHub
- SEED Project
- Run SEED VM on VirtualBox - SEEDVM_VirtualBoxManual.pdf
- VirtualBox Network Settings: All You Need to Know
- TCP Attacks Lab
- TCP_Attacks.pdf
- TCPIP.pdf
- Scapy - Wikipedia
- Network-security/Attacks on Layer2,3,4 Protocols at master · deepanshululla/Network-security · GitHub
- Python Scapy vs dpkt - Stack Overflow
- netwox examples
- Netwox
- Microsoft Word - course-paper-5620-attacktcpip.docx - course-paper-5620-attacktcpip.pdf
- Startpage.com - The world's most private search engine
- The TCP/IP Model and Protocol Suite Explained for Beginners
- Packet Traveling – Practical Networking .net
- Linux Capability Exploration Lab
- Role-Based Access Control (RBAC) Lab
- Encrypted File System Lab
- Top 20 OpenSSH Server Best Security Practices - nixCraft
- Linux PAM configuration that allows or deny login via the sshd server - nixCraft
- Linux: 25 Iptables Netfilter Firewall Examples For New SysAdmins - nixCraft
- 40 Linux Server Hardening Security Tips [2019 edition] - nixCraft
- Security-Enhanced Linux - Wikipedia
- sudo - From a security standpoint should I add my user to the sudoers file or not? - Unix & Linux Stack Exchange
- 25 Hardening Security Tips for Linux Servers
- Unix security - Wikipedia
- Fear Not Root « IgnorantGuru's Blog
- Dangerous Sudoers Entries – PART 1: Command Execution – Compass Security Blog
- How to exploit SUDO via Linux Privilege Escalation
- Environment Variable and Set-UID Lab
- 1987-sproglogin.pdf
- setuid - Wikipedia
- Comparison of privilege authorization features - Wikipedia
- File system permissions - Wikipedia
- Capabilities - ArchWiki
- setuid-usenix02.pdf
- Microsoft Word - setuid.txt - setuid.pdf
- POS37-C. Ensure that privilege relinquishment is successful - SEI CERT C Coding Standard - Confluence
- POS36-C. Observe correct revocation order while relinquishing privileges - SEI CERT C Coding Standard - Confluence
- linux - Understanding UNIX permissions and file types - Unix & Linux Stack Exchange
- files - Difference between owner/root and RUID/EUID - Unix & Linux Stack Exchange
- How to use setuid to install a root backdoor. · GitHub
- Honeypot (computing) - Wikipedia
- Hack Like a Pro: How to Set Up a Honeypot & How to Avoid Them « Null Byte :: WonderHowTo
- What is Honeyspot? -
- Protocol spoofing - Wikipedia
- Mail Server Security: Potential Vulnerabilities and Protection Methods
- Active Directory Security – Active Directory & Enterprise Security, Methods to Secure Active Directory, Attack Methods & Effective Defenses, PowerShell, Tech Notes, & Geek Trivia…
INTERVIEW PREP - GENERAL RESOURCES
- Stripe (company) - Wikipedia
- glassdoor.fr/Entretien/Stripe-questions-entretien-d-embauche-E671932.htm?countryRedirect=true
- teamblind.com/issue/13749/Stripe-Interview
- Guide: How to Get a Job at Stripe - Pathrise
- Cracking The Code: Why Stripe Defies A Tech-Interview Norm
- Stripe: Jobs
- The untold story of Stripe, the secretive $20bn startup driving Apple, Amazon and Facebook | WIRED UK
- Stripe Data Science Interview Questions | by Vimarsh Karbhari | Acing AI | Medium
- Stripe: Recruiting, hiring, and managing talent
- What is the engineering interview process like at Stripe? - Quora
- CS Career Hackers | Home
- Preparing for Tech Interviews with Paul Carleton of Stripe [INTERVIEW]
- resources.infosecinstitute.com/top-50-information-security-interview-questions/
- How to prepare for a security engineer interview. | by Eray Mitrani | Medium
- How should I prepare for a production engineer interview at Facebook? - Quora
- Production Engineering Internship Interview Process @ Facebook - Shivam Khandelwal
- xss mitigation at DuckDuckGo
- how do browsers prevent xss at DuckDuckGo
- How do web browsers detect XSS attempts when the X-XSS-Protection header is enabled? - Information Security Stack Exchange
- youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/playlists
- youtube.com/playlist?list=PLXKn7LtkQIZVH-UjkqnbcpfT4dxOJcuhE
- Top 60 Linux Interview Questions & Answers
- Top 50 Unix Interview Questions & Answers
- Coding Practice - InterviewBit
IOT - ROBOTICS - AI - ELECTRONICS
- GitHub - fffaraz/awesome-cpp: A curated list of awesome C++ (or C) frameworks, libraries, resources, and shiny things. Inspired by awesome-... stuff.
- What is the relationship between IoT and cloud computing? - Quora
- The cloud and the Internet of things are inseparable | InfoWorld
- The role of cloud tech in internet of things - Knowlarity
- arduino vs raspberry pi for robotics at DuckDuckGo
- best platform for robotics at DuckDuckGo
- Artificial Intelligence: A Modern Approach
- Full Table of Contents for AI: A Modern Approach
- robot rover arduino project at DuckDuckGo
- 18 rover Projects - Arduino Project Hub
- best arduino robot project at DuckDuckGo
- Spy Rover Robot Implemented Using IP Camera that Allows Long Distance Transmission
- How To Build Custom Android App for your Arduino Project using MIT App Inventor - HowToMechatronics
- Arduino Remote LITE - A new and simple Remote Control app for Arduino
- Arduino Bot Android Remote Control : 7 Steps (with Pictures) - Instructables
- Startpage.com - The world's most private search engine
- How to Turn Your Android Phone into a Security Camera - Make Tech Easier
- How to Detect a Hidden Camera with Your Android Phone - Make Tech Easier
- Turn your old phone into a security camera for free - CNET
- How to Turn an Old Android Phone into a Security Camera
- How To Turn Your Android Device Into A Security Camera
- How to Use Your Android Device as a Security Camera | Laptop Mag
- microcontroller vs. System on chip - Electrical Engineering Stack Exchange
- pcb - Chip vs printed circuit board - Electrical Engineering Stack Exchange
- What is the difference between printed circuit board (PCB), IC, OP AMP and chip? - Quora
- System-on-Chip vs Single-Board Computer: A Comparison Guide
- What are the major differences between an SBC (single board computer) and SoC (system on chip)? - Quora
- What are the differences between single board computer and microcontroller? - Quora
- Hardware Fundamentals: what exactly is a microcontroller?
- Microprocessors vs. Microcontrollers vs. SoCs: All You Need to Know
- FPGAs, SoCs, Microcontrollers— A Quick Rundown of IoT Devices | Hacker Noon
- programming - Is arduino a single board computer? - Arduino Stack Exchange
- Single-board microcontroller - Wikipedia
- Comparison of single-board microcontrollers - Wikipedia
- Single-board computer - Wikipedia
- Comparison of single-board computers - Wikipedia
- Microcontroller - Wikipedia
- System on a chip - Wikipedia
MATHS - ALGORITHMICS
- Loop invariant - Wikipedia
- Invariant (mathematics) - Wikipedia
- Correctness (computer science) - Wikipedia
- Precondition - Wikipedia
- Postcondition - Wikipedia
- Model checking - Wikipedia
- Hoare logic - Wikipedia
- lec08-loop-invariant.pdf
- 161-section-1.pdf
- CS 136, Lecture 12
- From loop invariants to recursion invariants | Beta reduction
- algorithm - General proof strategies to show correctness of recursive functions? - Stack Overflow
- loop-invariants
- Loop invariants can give you coding superpowers · YourBasic
- What is the best way of determining a loop invariant? - Stack Overflow
- lec07.pdf
- lec08.pdf
- Prove correctness of recursive algorithm - Computer Science Stack Exchange
- Startpage.com - The world's most private search engine
- strong vs weak induction at DuckDuckGo
- Mathematical induction - Wikipedia
- Vacuous truth - Wikipedia
- Empty set - Wikipedia
- logic - How can I correct my wrong Intuition that $\forall \, x \, \in \,\emptyset : P(x) \quad $ is false? - Mathematics Stack Exchange
- logic - Vacuous Truth and Universal Conditional Statements - Mathematics Stack Exchange
- logic - Intuition behind Vacuous proofs - Mathematics Stack Exchange
- elementary set theory - vacuous truth -> empty set is both included and not included in every set? - Mathematics Stack Exchange
- elementary set theory - Aren't vacuous statements True and False simultaneously? - Mathematics Stack Exchange
- elementary set theory - If $A$ is an empty set, how should I understand $\forall x\in A$? - Mathematics Stack Exchange
- logic why false implies true at DuckDuckGo
- logic - "false implies true" is a true statement - Mathematics Stack Exchange
- logic - How does false false imply true? - Mathematics Stack Exchange
- In mathematical logic, why does false imply everything? - Quora
- Math Forum - Ask Dr. Math
- Falsity implies anything
- Paradoxes of material implication - Wikipedia
- Newest 'correctness-proof' Questions - Computer Science Stack Exchange
MATHS - NUMERAL SYSTEMS STUDY
- Radix - Wikipedia
- Method of complements - Wikipedia
- Ones' complement - Wikipedia
- Two's complement - Wikipedia
- Binary Subtraction with 2's Complement - Stack Overflow
- Positional notation - Wikipedia
- Binary-coded decimal - Wikipedia
- Non-standard positional numeral systems - Wikipedia
- Signed number representations - Wikipedia
- Binary-to-text encoding - Wikipedia
- why base 10 numeration system is the most popular at DuckDuckGo
- Why have we chosen our number system to be decimal (base 10)? - Mathematics Stack Exchange
- Why do we use decimal system? - Mathematics Stack Exchange
- Is '$10$' a magical number or I am missing something? - Mathematics Stack Exchange
- Roman numerals - Wikipedia
- Math Forum - Ask Dr. Math
- Order theory - Wikipedia
- arithmetic - Proof of the standard algorithm for addition? - Mathematics Stack Exchange
- why positional system start from position 0 at DuckDuckGo
- Solved: Why is a symbol for zero needed in a positional system? | Chegg.com
- Babylonian cuneiform numerals - Wikipedia
- 0 - Wikipedia
- non positional number systems at DuckDuckGo
- Difference Between Positional and Non-Positional Number Systems
- What is a non-positional number system? - Quora
- What is the difference between a positional number system and a non-positional number system? - Quora
- Positional notation - Wikipedia
- Nonpositional numeral systems - OeisWiki
- List of numeral systems - Wikipedia
- Numbering Systems and Computer Codes
NETWORKING FUNDAMENTALS
- subnetting theory course pdf - Recherche Google
- subnetting theory course pdf - Recherche Google
- osi model pdf - Recherche Google
- TCP vs UDP, TCP IP Model vs OSI & More | Pluralsight
- Video Notes: Tanenbaum, Wetherall Computer Networks 5e
- youtube.com/playlist?list=PLXKn7LtkQIZWADmS-mzdgUHisw7ytRUXr
- youtube.com/watch?v=HRQkdSKz5TU&t=1455s&list=PLXKn7LtkQIZWADmS-mzdgUHisw7ytRUXr&index=1
- Wonder How To » Fresh Hacks For a Changing World
- Hacker Fundamentals: A Tale of Two Standards « Null Byte :: WonderHowTo
- Hacker Fundamentals: The Everyman's Guide to How Network Packets Are Routed Across the Web « Null Byte :: WonderHowTo
- frame vs packet networking at DuckDuckGo
- networking - Difference between PACKETS and FRAMES - Stack Overflow
- internet - What are the differences in the contents of datagrams, frames, and network packets? - Network Engineering Stack Exchange
- What is the difference between a packet and a frame with reference to the OSI model? - Quora
- slashroot.in/difference-between-segments-packets-and-frames
- the internet undersea world at DuckDuckGo
- best tutorial packet tracer cisco at DuckDuckGo
- How to learn how to use Cisco Packet Tracer from beginning - Quora
- Cisco Packet Tracer Tutorial - Resources to Download Cisco Packet Tracer
- why is there 65536 ports at DuckDuckGo
- Is there a hard limit of 65536 open TCP connections per IP address on linux? - Super User
- networking - Why do computers have 65,535 TCP ports? - Super User
- Encapsulation (networking) - Wikipedia
- ip - Why Are There Only 65,535 Ports, and Will We Ever Have More? - Server Fault
- 65,536 - Wikipedia
- routing - Ping between different subnet across a link - Network Engineering Stack Exchange
OS KERNEL PROGRAMMING & HACKING
- Kernel Hacking Guides — The Linux Kernel documentation
- unix kernel hacking - Recherche Google
- sprg.uniroma2.it/kernelhacking2006/
- 4 paths to being a kernel hacker
- The Linux Kernel Module Programming Guide
- LKMPG/LKMPG-4.14.8.org at master · qshan/LKMPG · GitHub
- Linux Loadable Kernel Module HOWTO
- Loadable kernel module - Wikipedia
- Difference between Linux Loadable and built-in modules - Stack Overflow
- linux - What's the difference between insmod and modprobe? - Stack Overflow
- modprobe - Wikipedia
- kernel.org/doc/Documentation/kbuild/makefiles.txt
- kernel.org/doc/Documentation/kbuild/modules.txt
- What is the functional difference between kbuild and normal makefile? - Quora
- Writing your First Linux driver in the Classroom | Playing with Systems
- Linux Device Drivers, Third Edition [LWN.net]
- Linux_Kernel_Newbies - Linux Kernel Newbies
- Easy Intro to Linux Kernel Programming - YouTube
- Introduction to Kernel Modules and Kbuild - YouTube
- Exploring the Linux kernel: The secrets of Kconfig/kbuild | Opensource.com
- kernel image path linux at DuckDuckGo
- boot - Once booted, Find Full Path of Kernel Image? - Unix & Linux Stack Exchange
- Where can I find the Linux kernel file? - Super User
- install other kernel unix at DuckDuckGo
PRIVACY - ENDPOINT - ANDROID
- How to Encrypt your Phone? (Guide to Encrypted Phone) | Beencrypted
- Full disk encryption easily broken on tens of millions of Android devices - Neowin
- Android’s full-disk encryption just got much weaker—here’s why | Ars Technica
- Bits, Please!: Extracting Qualcomm's KeyMaster Keys - Breaking Android Full Disk Encryption
- yahoo
- How to Crack Android Full Disk Encryption on Qualcomm Devices
- The full-disk encryption protecting your Android can be cracked | CSO Online
- Google’s full-disk encryption in Android can be hacked – BGR
- CVE-2014-10047 | Google Android Full Disk Encryption weak encryption (BID-103671)
- Android Flaw Allows Full-Disk Crypto Bypass - BankInfoSecurity
- android full disk encryption site:security.stackexchange.com - Google Search
PRIVACY - ENDPOINT - FDE THEORY
- What is Full-Disk Encryption (FDE)? – TechTalks
- Difference between Fast Encryption and Full Device Encryption - Computers | Android Forums
- Key management - Wikipedia
- Public key infrastructure - Wikipedia
- Password management - Wikipedia
- Disk encryption theory - Wikipedia
- Disk encryption - Wikipedia
- Disk encryption software - Wikipedia
- Comparison of disk encryption software - Wikipedia
- Filesystem-level encryption - Wikipedia
- List of cryptographic file systems - Wikipedia
- Attention Required! | Cloudflare
- Full disk encryption | Surveillance Self-Defense
- Data remanence - Wikipedia
- Hardware-based full disk encryption - Wikipedia
- Crypto-shredding - Wikipedia
- Data erasure - Wikipedia
- Self-encrypting drive VS full disk encryption VS volume encryption
- Hardware full disk encryption technology for military applications using two-layer commercial solutions - Military Embedded Systems
- Full Disk Encryption vs Storage Encryption - Information Security Stack Exchange
- ubuntu - Is suspend-to-ram really a meaningful risk for Full Disk Encryption? - Information Security Stack Exchange
- physical - How does full memory encryption in newer processes protect against DMA attacks? - Information Security Stack Exchange
- Is it possible to prevent a physical attack on full disk encryption? - Information Security Stack Exchange
- attacks - Breaking full-disk encryption on a computer that's rarely used - Information Security Stack Exchange
- destruction - Erasing a hard-disk, encrypting it as alternative? - Information Security Stack Exchange
- If /system partition is never encrypted (even in "full-disk" encryption), how is it protected? - Android Enthusiasts Stack Exchange
- Isn't file encryption good enough? - Information Security Stack Exchange
- Full disk encryption vs home folder encryption - why should the former be chosen over the latter - Information Security Stack Exchange
- encryption - Crypto-shredding & backups of keys - Information Security Stack Exchange
- Crypto shredding: How it can solve modern data retention challenges | by Brent Robinson | Medium
- Cryptographic Erasure: Moving Beyond Hard Drive ...
- Blog | GB Advisors
- Information Security Office
- Key Management and Full Disk Encryption (FDE)
- Disk Encryption 101
- Full-Disk Encryption Works - Schneier on Security
- Full Disk Encryption - an overview | ScienceDirect Topics
- You & Your Data, Part 1: Full Disk Encryption | by Matt Millen | Medium
- Is hardware based disk encryption more secure that software based? - Information Security Stack Exchange
PRIVACY - ENDPOINT - LINUX
- How to nuke your encrypted Kali install | Kali Linux
- beencrypted.com/how-to-encrypt-your-disk-in-linux/
- Emergency self-destruction of LUKS in Kali | Kali Linux
- Uncrackable: Secure Your Secrets with 4096-Bit Encryption « Null Byte :: WonderHowTo
- EncryptedHome - Community Help Wiki
- EncryptedPrivateDirectory - Community Help Wiki
- How to Encrypt Your Home Folder After Installing Ubuntu
- Linux File Encryption Using GPG
- schneier.com/blog/archives/2014/10/iphone_encrypti_1.html
- LUKS In-Place Conversion Tool
- An Overview of the Unix Filesystem - Understanding the Linux Kernel, Second Edition [Book]
- Unix filesystem - Wikipedia
- Index of /~cs161/videos
- opensource.com/article/18/4/ext4-filesystem
- opensource.com/life/16/10/introduction-linux-filesystems
- An introduction to Linux's EXT4 filesystem | Opensource.com
- The Fundamentals of FDE: Comparing the Top Full Disk Encryption Products | Trusted Computing Group
- Disk Encryption User Guide - Fedora Project Wiki
- Secure cryptoprocessor - Wikipedia
- Trusted Platform Module - Wikipedia
- Authenticated encryption - Wikipedia
- modes of operation - Why should I use Authenticated Encryption instead of just encryption? - Cryptography Stack Exchange
- Encryption is less secure than we thought | MIT News
- Security - ArchWiki
- Data-at-rest encryption - ArchWiki
- Difference between Fast Encryption and Full Device Encryption - Computers | Android Forums
- Chapter 9. System tips
- chosen plaintext attack - Is it possible to build a CPA-secure encryption scheme which remains secure even when the encryption of secret key is given? - Cryptography Stack Exchange
- blog.pnb.io | 525: SSL handshake failed
- Comparison of disk encryption software - Wikipedia
- schneier.com/blog/archives/2012/12/breaking_hard-d.html
- So long, TrueCrypt: 5 alternative encryption tools that can lock down your data | PCWorld
- VeraCrypt - Wikipedia
- Here's how to best secure your data now that the NSA can crack almost any encryption | PCWorld
- where does a filesystem reside at DuckDuckGo
- File system - Wikipedia
- Understanding where the filesystem reside in order to understand why one cannot implement FDE after OS installation at DuckDuckGo
- system installation - How can I install Ubuntu encrypted with LUKS with dual-boot? - Ask Ubuntu
- system installation - Dual Boot Ubuntu full disk encrypted but Windows untouched - Ask Ubuntu
- windows - Full disk encryption on dual boot system (Truecrypt/Veracrypt) - Information Security Stack Exchange
- Dual boot Windows + Linux with encryption - Super User
- Dual boot full disk encryption... And I'm too dumb to set it up, even with the various guides on the internet. : linux4noobs
- ManualFullSystemEncryption - Community Help Wiki
- full disk encryption on shared partition at DuckDuckGo
- encryption - Should I encrypt my entire hard drive, or only a partition? - Information Security Stack Exchange
- encryption - How to share an encrypted storage on Windows, Mac OS X and Linux in a secure way - Super User
- Arch boot process - ArchWiki
- Boot Sequence - OSDev Wiki
- Multi-boot with full hard drive encryption and pre-boot authentication - Information Security Stack Exchange
- hardware - Securing the bootloader - Information Security Stack Exchange
- When using LUKS, which parts of the hard disk are not encrypted? - Information Security Stack Exchange
- encryption - Mitigating the LUKS decryption key residing in RAM for FDE - Information Security Stack Exchange
- Full Disk Encryption with VeraCrypt | by Andrew Douma | Medium
- Which type of disk encryption protects the MBR (master boot record) file of the system? - Skillset
- security - How to delete file(s) in secure manner? - Ask Ubuntu
- linux - How to know if a disk is an SSD or an HDD - Unix & Linux Stack Exchange
- Look before you leap into Disk Encryption
PRIVACY - ENDPOINT - SED
- hardware based full disk encryption drive best vendors at DuckDuckGo
- hardware based full disk encryption drive best vendors site:*.stackexchange.com at DuckDuckGo
- DuckDuckGo — Privacy, simplified.
- best self-encrypting drive vendors at DuckDuckGo
- best self-encrypting drive vendors site:*.stackexchange.com at DuckDuckGo
- how to buy self-encrypting drive at DuckDuckGo
- how to buy self-encrypting drive site:*.stackexchange.com at DuckDuckGo
- Full Disk Encryption Buyer's Guide
- Comparison of encrypted external drives - Wikipedia
- startpage.com/do/metasearch.pl
- Hardware security module - Wikipedia
- How secure is hardware Full disk encryption (FDE) for SSD's - Information Security Stack Exchange
- 256-bit AES encryption broken in SandForce SSD controllers - The Tech Report
- wd.dvi - 1002.pdf
- seds-at-risks.pdf
- 310.pdf
- disk encryption - How do I verify that my FDE/SED Opal SSD is indeed encrypted - Information Security Stack Exchange
- deletion - What can be recovered? Securely deleted files - Information Security Stack Exchange
- encryption - Is it possible to tell if hard drive is encrypted? - Information Security Stack Exchange
- disk encryption - How to tell if my laptop is protected by FDE? - Super User
- Solid state of fear: Euro boffins bust open SSD, Bitlocker encryption (it's really, really dumb) • The Register
- Help
- Researchers Break Full-Disk Encryption of Popular SSDs | SecurityWeek.Com
- linux - Laptops SSD: Hardware Encryption plus DM-Crypt/Luks - Security and Performance - Information Security Stack Exchange
- Are there any hardware encryption solutions for my notebook? - Information Security Stack Exchange
- aes - How secure is Intel SSD Encryption? - Information Security Stack Exchange
- truecrypt - SSD full disk encryption - Information Security Stack Exchange
- security - Are Macs vulnerable to the recent SSD encryption vulnerability? - Ask Different
- Hardware encryption for flash drives - Information Security Stack Exchange
- encryption - HDD password vs Bitlocker - Information Security Stack Exchange
- Self-encrypting drives - ArchWiki
- Think your SSD offers rock-solid encryption? Here’s why it’s time to think again…
- I want the TRUTH about SSDs and FDE (Full Disk Encryption) / SED (Self-Encrypting Dri - Ars Technica OpenForum
- Is it better to use Bitlocker or the built-in-drive-encryption that my SSD offers? - Super User
- macbook pro - Why is a secure erase 'not necessary' for SSD's? - Ask Different
- PDF.js viewer
- ubuntu - How to wipe free disk space in Linux? - Super User
PRIVACY ANONYMITY LEARNING
- Surveillance Self-Defense | Tips, Tools and How-tos for Safer Online Communications
- All Tutorials | The Tin Hat
- Restore Privacy | Your online privacy resource center
- PrivacyTools - Encryption Against Global Mass Surveillance
- Home | Me and my Shadow
- Be Encrypted - Fight Against Data Theft & Cybercrime
- GitHub - nikitavoloboev/privacy-respecting: Curated List of Privacy Respecting Services and Software
- motherboard.vice.com/en_us/article/a37p94/what-is-threat-modeling
- invisiblecomputer.wonderhowto.com/news/social-hacking-and-protecting-yourself-from-prying-eyes-0133944/
- You need to encrypt all your data. This is how it’s done
- Real people don't (just) need encryption / Boing Boing
- How to Encrypt Your Texts, Calls, Emails, and Data | WIRED
- How to Protect Your Webcam, Computer Screen, and Passwords | WIRED
- The Encryption Debate Should End Right Now, After Vault 7, Shadow Brokers, WannaCry, and Petya | WIRED
- What To Do If You've Been Doxed | WIRED
- A radical proposal to keep your personal data safe | Richard Stallman | Opinion | The Guardian
- How to Become Anonymous & Browse the Internet Safely « Null Byte :: WonderHowTo
- TypoGuy Explaining Anonymity: Your Real Identity « Null Byte :: WonderHowTo
- null-byte.wonderhowto.com/how-to/stay-as-anonymous-as-possible-online-0138088/
QUANTUM COMPUTING
- Get started with the Quantum Development Kit (QDK) - Microsoft Quantum | Microsoft Docs
- Get started with the Quantum Development Kit (QDK) - Microsoft Quantum | Microsoft Docs
- Quantum computing foundations - Learn | Microsoft Docs
- Untitled-12 - Quantum_Walks_and_Search_Algorithms-2nsEd_2018_Portugal.pdf
- NB.pdf
- Quantum Computation Primer - Part 1 - CodeProject
- Programming a quantum computer: generating true random numbers
- Copenhagen interpretation - Wikipedia
- Introduction to the Quantum Katas - Microsoft Quantum | Microsoft Docs
- Introduction to the Quantum Machine Learning Package - Microsoft Quantum | Microsoft Docs
- GitHub - microsoft/Quantum: Microsoft Quantum Development Kit Samples
- GitHub - microsoft/QuantumLibraries: Q# libraries for the Quantum Development Kit
- GitHub - ebraminio/awesome-qsharp: A curated list of Q# code and resources.
- GitHub - microsoft/QuantumKatas: Tutorials and programming exercises for learning Q# and quantum computing
- Q# Blog
- Everything you should know about the Quantum Development Kit, but were afraid to ask | Q# Blog
- Quantum computing | Microsoft
- Quantum Development Kit | Microsoft
- Quantum Computing for Computer Scientists - YouTube
- Practice Quantum Computing | Brilliant
- Quantum computing - Wikipedia
- Timeline of quantum computing and communication - Wikipedia
- Q is for Quantum by Terry Rudolph - Q is for Quantum
- Quantum Computing Since Democritus: Aaronson, Scott: 9780521199568: Amazon.com: Books
- Quantiki | Quantum Information Portal and Wiki
- Home Page For Umesh Vazirani
- Startpage.com - The world's most private search engine
- resource request - Is my background sufficient to start quantum computing? - Quantum Computing Stack Exchange
- resource request - Programming quantum computers for non-physics majors - Quantum Computing Stack Exchange
- emulation - Are there emulators for quantum computers? - Quantum Computing Stack Exchange
- What programming languages are available for quantum computers? - Quantum Computing Stack Exchange
- GitHub - rigetti/pyquil: A Python library for quantum programming using Quil.
- Developing quantum algorithms for optimization problems
- How Do You Code for a Quantum Computer?
- How to program a quantum computer | by Dr James Wootton | Qiskit | Medium
- Startpage.com - The world's most private search engine
- What Is Quantum Computing? The Complete WIRED Guide | WIRED
- What Exactly Is Quantum Computing?
- Five ways quantum computing will change the way we think about computing
- applications - Is quantum computing just pie in the sky? - Quantum Computing Stack Exchange
- physical realization - What is the argument that practical quantum computers cannot be built? - Quantum Computing Stack Exchange
- What’s the difference between quantum annealing and universal gate quantum computers? | by Anastasia Marchenkova | Quantum Bits | Medium
- What are the models of quantum computation? - Quantum Computing Stack Exchange
- A quantum computer that doesn't use entangled qubits has the same computational power as a classical one? - Quantum Computing Stack Exchange
- architecture - Is Quantum Biocomputing ahead of us? - Quantum Computing Stack Exchange
- algorithm - Classical Memory enough to store states up to 40 qubits quantum system? - Quantum Computing Stack Exchange
- bloch sphere - Information content of qubits - Quantum Computing Stack Exchange
- Startpage.com - The world's most private search engine
- Post-quantum cryptography - Wikipedia
- On quantum computing and cryptography | Quantum Bits
- Quantum Computing and Cryptography - Schneier on Security
- Advantage of quantum key distribution over post-quantum cryptography - Quantum Computing Stack Exchange
- 9783540887010-c1.pdf
- cryptography - What kinds of encryption are _not_ breakable via Quantum Computers? - Information Security Stack Exchange
- complexity theory - Is it possible for an encryption method to exist which is impossible to crack, even using quantum computers? - Quantum Computing Stack Exchange
- What does a "real" quantum computer need for cryptanalysis and/or cryptographic attack purposes? - Cryptography Stack Exchange
- Introduction
- The quantum meltdown of encryption – TechCrunch
- AI, quantum computing and 5G could make criminals more dangerous than ever, warn police | ZDNet
- What next in the world of post-quantum cryptography? - Ericsson
- Quantum Computing and its Impact on Cryptography
- Waiting for quantum computing: Why encryption has nothing to worry about | TechBeacon
- Is Quantum Computing an Existential Threat to Blockchain Technology?
- Startpage.com - The world's most private search engine
- The Limits of Quantum Computers - The_Limits_of_Quantum_Computers.pdf
- Complexity and quantum computing | Quantum Bits
- An update on quantum computing and complexity classes | Quantum Bits
- Finally, a Problem That Only Quantum Computers Will Ever Be Able to Solve | Quanta Magazine
- Scott Aaronson: Quantum and Classical Uncertainty
- Poster: Automatically Solving NP-Complete Problems on a Quantum Computer - hu2018icse.pdf
- Quantum + NP-Complete = No problem | by Brianna Gopaul | Coinmonks | Medium
- npcomplete.dvi - npcomplete.pdf
REVERSE ENGINEERING - BINARY EXPLOITATION
- InfoSec · AnarchoTechNYC/meta Wiki · GitHub
- lowlevelprogramming-university/README.md at master · gurugio/lowlevelprogramming-university · GitHub
- Page not found · GitHub · GitHub
- Projects · RomaniukVadim / ctf-tools · GitLab
- Modern Binary Exploitation - Spring 2015
- Startpage.com - The world's most private search engine
- github.com/radare/radare2
- GitHub - radareorg/awesome-radare2: A curated list of awesome projects, articles and the other materials powered by Radare2
- Introduction · Radare2 Book
- Adding Metadata · Radare2 Book
- Migration from ida, GDB or WinDBG · Radare2 Book
- Home - r2wiki
- Tips - r2wiki
- Cheatsheet - r2wiki
- Radare 2 in 0x1E minutes – Techorganic – Musings from the brainpan
- moveax.me/radare2-visual-mode/
- r2-cheatsheet.pdf
- Server Not Found
- Server Not Found
- Tomas_Antecky-Disassembling_with_radare2.pdf
- Getting started with Radare2
- Max Kersten – Security through explanation
- moveax.me/
- Page not found · GitHub Pages
- tools - How to handle stripped binaries with GDB? No source, no symbols and GDB only shows addresses? - Reverse Engineering Stack Exchange
- strip - What are stripped and not-stripped executables in Unix? - Unix & Linux Stack Exchange
- GDB – Debugging stripped binaries | Félix Abecassis
- System V ABI - OSDev Wiki
- PDF.js viewer
- mpx-linux64-abi.pdf
- 325462-sdm-vol-1-2abcd-3abcd.pdf
- www3.nd.edu/~dthain/courses/cse40243/fall2015/intel-intro.html
- Basic CPU architecture – Max Kersten
- Home · HJLebbink/asm-dude Wiki · GitHub
- MOV · HJLebbink/asm-dude Wiki · GitHub
- x86 and amd64 instruction reference
- Mirror of: Into the Void: x86 Instruction Set Reference
- Intel 80x86 Assembly Language OpCodes
- coder32 edition | X86 Opcode and Instruction Reference 1.12
- docs/x86.md at master · corkami/docs · GitHub
- pics/opcodes_tables_compact.pdf at master · corkami/pics · GitHub
- pics/elf101.pdf at master · corkami/pics · GitHub
SYSTEMS & NETWORKS PWNING
- Offensive Computer Security Home Page (CIS 4930 / CIS 5930) Spring 2014
- Hacking, 2nd Edition | No Starch Press
- 0x200 Programming - Shichao's Notes
- Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
- awesome-infosec/readme.md at master · onlurking/awesome-infosec · GitHub
- InfoSec · AnarchoTechNYC/meta Wiki · GitHub
- GNU Debugger - Wikipedia
- Debugging with GDB
- GDB Command Reference - Index page
- Top (Debugging with GDB)
- Linux Tutorial - GNU GDB Debugger Command Cheat Sheet
- Using GDB to Develop Exploits - A Basic Run Through
- Migration from ida, GDB or WinDBG · Radare2 Book
- Chapter 20. Debugging a Running Application Red Hat Enterprise Linux 7 | Red Hat Customer Portal
- Programmers Who Don't Understand Security Are Poor at Security - Schneier on Security
- SEI CERT C Coding Standard - SEI CERT C Coding Standard - Confluence
- Defensive Programming for Red Hat Enterprise Linux (and What To Do If Something Goes Wrong) - defprogramming.pdf
- GitHub - HJLebbink/asm-dude: Visual Studio extension for assembly syntax highlighting and code completion in assembly files and the disassembly window
- Home · HJLebbink/asm-dude Wiki · GitHub
- Guide to x86 Assembly
- abi386-4.pdf
- Intel® 64 and IA-32 Architectures Software Developer’s Manual, Combined Volumes: 1, 2A, 2B, 2C, 2D, 3A, 3B, 3C, 3D and 4 - 325462-sdm-vol-1-2abcd-3abcd.pdf
- Digital Attack Map
- Gallery - Digital Attack Map
- What is a DDoS Attack? - Digital Attack Map
- DDoS Protection 101: What Is DDoS? | NETSCOUT
- What is an Application Layer Attack? | NETSCOUT
- What is a State-Exhaustion Attack? | NETSCOUT
- What is a Volumetric DDoS Attack? | NETSCOUT
- What Is a Distributed Denial-of-Service (DDoS) Attack? | Cloudflare
- DNS Amplification DDoS Attack | Cloudflare
- Reflections on reflection (attacks)
- Domain Name System - Wikipedia
- Classification of DDos attacks: a short overview of modern approaches
- Amplification DDoS Attacks
- Classification of DoS Attacks | INCIBE-CERT
- Endpoint Denial of Service, Technique T1499 - Enterprise | MITRE ATT&CK®
- Network Denial of Service, Technique T1498 - Enterprise | MITRE ATT&CK®
- reflectionamplificationddospublic.pdf | Powered by Box
- Denial-of-service attack - Wikipedia
- How a Massive 540 Gb/sec DDoS Attack Failed to Spoil the Rio Olympics
- User Datagram Protocol - Wikipedia
- What is UDP? | Cloudflare
- TCP vs UDP, TCP IP Model vs OSI & More | Pluralsight
- Startpage.com - The world's most private search engine
- Anonymous DDoS Brazilian Government Websites Because Rio Olympics
- Rio Olympics Suffered Sustained 540GB/Sec DDoS Attacks
- Denial of Service Attacks & DDoS Attacks: 2016 Summer Olympics
- Brazil 2016 Summer Olympics: Hacker group Anonymous attacks feared
- Practice.png (PNG Image, 4429 × 5100 pixels) - Scaled (18%)
- crackme - Crack Me Material - Reverse Engineering Stack Exchange
- Startpage.com - The world's most private search engine
- Why are strings in C++ usually terminated with '\0'? - Stack Overflow
- strcpy, strcpy_s - cppreference.com
VULNERABILITY HUNTING PROGRAMS
- Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
- Hacker-Powered Security Testing & Bug Bounty | HackerOne
- HackerOne
- Vulnerability Disclosure Guidelines | HackerOne
- Home | Hacker101
- HackerOne
- Your Elastic Security Team, better security testing through bug bounties and managed security programs | Bugcrowd
- Synack - Most Trusted Crowdsourced Penetration Testing Platform
- ZERODIUM - The Leading Exploit Acquisition Platform
- ZERODIUM - How to Sell Your 0day Exploit to ZERODIUM
- Intigriti - Bug Bounty & Agile Pentesting Platform
- Home | Zero Day Initiative
- ARK Development and Security Bounty Program | by Rok Černec | ARK.io | Blog
- Microsoft Bounty Programs | MSRC
- Whitehat Program
- Program Rules – Application Security – Google
- Researcher Resources - How to become a Bug Bounty Hunter - Starter Zone - Bugcrowd Forum
- Bug bounty program - Wikipedia
- Bug Bounty Programs: A Quick Guide | by Threat Intel | Threat Intel | Medium
- Bug Bounty Toolkit. Last updated: 8th June 2020 | by Craig Hays | BugBountyHunting | Medium
- Tips from Top Hackers - How to fit bounties into your schedule and maximize payouts | @Bugcrowd
- How To Do Your Reconnaissance Properly Before Chasing A Bug Bounty | by Hussnain Fareed | InfoSec Write-ups | Medium
- Life as a bug bounty hunter | Hacker News
- Server Not Found
- Top 30 Bug Bounty Programs in 2020
- Yet another talk on bug bounty
- 19-year-old makes millions from ethical hacking | ZDNet
- #BugBounty — “I don’t need your current password to login into your account” - How could I… | by Avinash Jain (@logicbomb_1) | InfoSec Write-ups | Medium
- #BugBounty — “How I was able to shop for free!”- Payment Price Manipulation | by Avinash Jain (@logicbomb_1) | InfoSec Write-ups | Medium
- GitHub - streaak/keyhacks: Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.
- Zerodium Offers $1 Million for Tor Browser 0-Days That It will Resell to Governments
- Microsoft launches Azure DevOps bug bounty program, $20,000 rewards on offer | ZDNet
- Microsoft Offers $100,000 Bounty for Finding Bugs in Its Identity Services
- Tesla's software bug bounty is going to the big leagues with Pwn2Own - Roadshow
- Facebook Broadens Its Bug Bounty to Include Third-Party Apps | WIRED
- Samsung Launches Bug Bounty Program — Offering up to $200,000 in Rewards
- Facebook Offering $40,000 Bounty If You Find Evidence Of Data Leaks
- Get paid up to $40,000 for finding ways to hack Facebook or Instagram accounts
- Intel Corporation - Bug Bounty Program | HackerOne
- A Company Offers $500,000 For Secure Messaging Apps Zero-Day Exploits
- Get $1M for reporting zero-day flaws in Tor to "help Govt fight crime"
- Warning: Potential Security Risk Ahead
- EdOverflow | “CI Knew There Would Be Bugs Here” — Exploring Continuous Integration Services as a Bug Bounty Hunter
- Bug bounty: Hack Tesla Model 3 to win your own Model 3
- YouTube
- EP3: How to be a paid bug bounty hunter (EN) - YouTube
- Hackers are making big bucks working for the good guys
- White Hat Hacking: Hack the Pentagon? « Null Byte :: WonderHowTo
- The Department of Defense's Bug Bounty Program Has Flagged Thousands of Vulnerabilities
- A superstar Chinese hacker just won $112,000 from Google, its largest bug bounty ever
- Chromebook exploit earns researcher second $100k bounty – Naked Security
- Drone maker DJI in cyber-security row over bug bounty - BBC News
- Two New Spectre-Class CPU Flaws Discovered—Intel Pays $100K Bounty
- Uber used bug bounty program to launder blackmail payment to hacker | Ars Technica
- Facebook Bug Bounty Program Makes Biggest Reward Payout Yet | WIRED
- Life as a bug bounty hunter: a struggle every day, just to get paid | MIT Technology Review
- Three's a crowd: Popular bug bounty companies are growing at an insane rate - CyberScoop
WEB SECURITY & PENTESTING
- Full Ethical Hacking Course - Network Penetration Testing for Beginners (2019) - YouTube
- GitHub - coreb1t/awesome-pentest-cheat-sheets: Collection of the cheat sheets useful for pentesting
- OWASP Testing Guide v4 Table of Contents - OWASP
- owasp.org/index.php/Conduct_search_engine_discovery/reconnaissance_for_information_leakage_(OTG-INFO-001)
- Application Security Wiki
- Application Security Wiki
- Techniques - PRE-ATT&CK | MITRE ATT&CK®
- How to Use SecGen to Generate a Random Vulnerable Machine « Null Byte :: WonderHowTo
- How to Attack a Vulnerable Practice Computer: A Guide from Scan to Shell « Null Byte :: WonderHowTo
- Nmap Cheat Sheet
- Nmap Cheat Sheet and Pro Tips | HackerTarget.com
- Problem loading page
- VM Kali Linux - nmap why is so slow? - Information Security Stack Exchange
- A Practical Guide to Nmap (Network Security Scanner) in Kali Linux
- How to Spider Web Pages with Nmap for SQLi Vulnerabilities « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Conduct Active Reconnaissance and DOS Attacks with Nmap « Null Byte :: WonderHowTo
- Nikto, NMap , Skipfish and friends – VulPoint
- nmap - How to find live hosts on my network? - Information Security Stack Exchange
- How to Automate Brute-Force Attacks for Nmap Scans « Null Byte :: WonderHowTo
- networking - How to scan an entire network using Nmap? - Ask Ubuntu
- explainhownow.com/2019/scan-networks-with-nmap/
- How to Get Started Writing Your Own NSE Scripts for Nmap « Null Byte :: WonderHowTo
- Advanced Nmap: Top 5 Intrusive Nmap Scripts Hackers & Pentesters Should Know « Null Byte :: WonderHowTo
- Hack Like a Pro: How to Conduct Passive OS Fingerprinting with p0f « Null Byte :: WonderHowTo
- HelpUiTabsBreakpoints · zaproxy/zap-core-help Wiki · GitHub
- Hacking Web Apps « Null Byte :: WonderHowTo
- Community Byte: HackThisSite Walkthrough, Part 1 - Legal Hacker Training « Null Byte :: WonderHowTo
- Google Hacking Database (GHDB) - Google Dorks, OSINT, Recon
- 69.164.223.171
- pentestit.com/shodan-queries/
- Home
- Vulnerability Scanner - Web Application Security | Acunetix
- Hackazon
- what to do with nmap result at DuckDuckGo
- Nmap Cheat Sheet: From Discovery to Exploits - Part 1: Introduction to Nmap
g14_setup
- set up asus zephyrus g14 - Recherche Google
- DEFINITIVE - Compiled MegaList of FAQ, Tips, and Fixes to Common Problems for New (and Old) G14 Users! : ZephyrusG14
- https://www.reddit.com/r/ZephyrusG14/comments/hq043o/how_to_get_pg_updown_home_and_end_keys/
- Review: 2020 Asus Zephyrus G14
- How to set up new G14 : ZephyrusG14
- What are you all doing to increase battery life? : ZephyrusG14
- Battery life on G14 isn't good after 5 or so power cycles : ZephyrusG14
- Since it seems to be a deal breaker for some, here is some pictures of a G14 Moonlight White keyboard with no/all backlighting settings (June batch) : ZephyrusG14
- Summary about controlling fans/boost/TDP - all is possible : ZephyrusG14
- map end page down keys in 14 inch laptops - Recherche Google
- Solved: Lack of PgUp/PgDown/Home/End keys PAIN - Dell Community
- Evolution of Laptop Keyboards, No More Page Up/Down Keys!
- Mini keyboard has no home/end keys; how to type them? - Super User
- Home, end, pgdown and page up keys : ZephyrusG14
- AutoHotkey
- keybiard mapping windows - Recherche Google
- Guide: How to check a new laptop for issues - NotebookCheck.net Tech
- How We Test Laptops | PCMag
- How To Unbox and Quality Check a New Laptop
- How to Set Up Your New Laptop Like a Pro: Out of the Box Tips | Laptop Mag
- How do I reassign hot keys for my keyboard?
- page up hotkey windows - Google Search
- All the Windows 10 keyboard shortcuts you need to know - CNET
- fix keyboard baklight brightness g14 - Google Search
- Use Windows Settings to see what's using the most disk space
- The Asus ROG Zephyrus G14 has progressed beyond the need for vowels - The Verge
WD_Repair
- What To Do After Dropping An External Hard Drive | Datarecovery.com
- SOLVED: Dropped portable hard drive - Western Digital My Passport Ultra - iFixit
- How to recover data from a hard drive (stuck heads: buzzing, clicking, etc) - YouTube
- How to fix a broken hard drive Beeping noise or clicking RECOVER GET DATA BACK FOR FREE! BEST TRICK - YouTube
- My WD External hard drive not recognised - WD External Drives / WD Portable Drives - WD Community
- The Dropped External Hard Drive Won't Show Up | Small Business - Chron.com
- I dropped my WD elements hard disk by mistake. When connecting to the computer, it makes some noise and doesnt get detected. Can it be fixed? How? - Quora
- Startpage.com Search results
- External Western Digital Drive Makes Beeping Noise - Data Analyzers
- WD passport not working after fallen down | Tom's Hardware Forum
- WD My Passport Beeping Noise HELP ! ! ! | Tom's Hardware Forum
- hard drive - Western Digital My Passport Beeps - Super User
- troubleshooting - Western Digital drive making beeping noise - Super User
- Startpage.com Search results
- 13.04 - How to repair an external harddrive? - Ask Ubuntu
- linux - How to recover data from heavily damaged external hard drive? - Super User
- How do I recover lost/inaccessible data from my storage device? - Super User
- How do I recover lost/inaccessible data from my storage device? - Super User
- Startpage.com Search results
- How to Fix Disk 1 Unknown Not Initialized in Windows 10/8/7?
- Different Ways to Fix Disk Unknown Not Initialized in Windows 10
- 6 Ways to Fix Disk Unknown Not Initialized in Windows 10/8/7 - EaseUS
- 2 new messages
- Best Free Bit Copy Software for Windows 10/8/7 - AOMEI Backupper
- How to Clone a Hard Drive -
- Hard drive failing so I want to clone it | Tom's Hardware Forum
- How To Extract Files From a Dead Hard Drive
- hard drive - Should I do a bit-to-bit copy or a mirror of my damaged, encrypted HDD? (And how?) - Super User
- Ddrescue - GNU Project - Free Software Foundation (FSF)
- GNU ddrescue Manual
- Startpage.com Search results
- GNU ddrescue – The Best Damaged Drive Rescue - Linux.com
- SystemRescueCd - System Rescue Cd Homepage
- DIY Video 2 How to fix a broken hard drive Beeping noise Get your data Back! Best Kept Secret - YouTube
- Data Recovery On A Dead Hard Drive With Failed Heads - YouTube
Other Bookmarks
- Secure Processors Part I: Background, Taxonomy for Secure Enclaves and Intel SGX Architecture - trusted processors, CPUs
- CIS Benchmarks - Center for Internet Security
- Hackuna - The First Android Mobile App to Track Hackers
- Automate your Python code tests with tox | Opensource.com
- GitHub - am0nt31r0/OSINT-Search: Useful for digital forensics investigations or initial black-box pentest footprinting.
- Stealing Ethereum by Guessing Weak Private Keys - blockchain cryptocurrency hacking - Schneier on Security
- 5 Cybersecurity Best Practices You Should Be Following Right Now
- GitHub - We5ter/Flerken: Open-Source Obfuscated Command Detection Tool
- Over Dozen Popular Email Clients Found Vulnerable to Signature Spoofing Attacks
- Defending Democracies Against Information Attacks - privacy, government surveillance - Schneier on Security
- Security Experts Unite Over the Right to Repair - planned obsolescence | WIRED
- GitHub - SpiderLabs/HostHunter: HostHunter a recon tool for discovering hostnames using OSINT techniques.
- Sensitive data of 80 million US households exposed online - privacy, anonymity
- Hackers Found Exploiting Oracle WebLogic RCE Flaw to Spread Ransomware
- DHS Orders Federal Agencies to Patch Critical Flaws Within 15 Days - Cyberwarfare
- Write faster C extensions for Python with Cython | Opensource.com
- On Security Tokens - Multi factor authentication - Schneier on Security
- What is the IoT? Everything you need to know about the Internet of Things right now - Fundamentals, smart cities | ZDNet
- IoT devices are an enterprise security time bomb | ZDNet
- I know what you ate last supper: What home sensors will reveal about your life - IoT security, privacy, smart homes - TechRepublic
- Internet of Things security woes: Can smarter consumers save the IoT from disaster? | ZDNet
- History repeating: How the IoT is failing to learn the security lessons of the past | ZDNet
- bluetooth-inherent-security-issues
- Why IoT devices pose a bigger cybersecurity risk than most realize | ZDNet
- When your IoT goes dark: Why every device must be open source and multicloud - IoT Security | ZDNet
- 6 things keeping IoT pros up at night - IoT Security - TechRepublic
- IoT security crackdown: Stop using default passwords and guarantee updates, tech companies told | ZDNet
- Mysterious hacker has been selling Windows 0-days to APT groups for three years - Darknet, Underground Vulnerability Market | ZDNet
- Putin signs Runet law to cut Russia's internet off from rest of world - Government Surveillance | ZDNet
- Hackers lurked in Citrix systems for six months -. APT attacks | ZDNet
- JavaScript card sniffing attacks spread to other e-commerce platforms - Magecart Group 12, hacking group, Marento based ecommerces | ZDNet
- Hacktivists Are on the Rise—but Less Effective Than Ever - Hacking Groups, Anonymous | WIRED
- Mozilla announces ban on Firefox extensions containing obfuscated code - extension code audit, browser security | ZDNet
- New Google Chrome mobile phishing scam can steal private data - spoofing
- Law enforcement seizes dark web market after moderator leaks backend credentials - anonymity throughout atacks | ZDNet
- Facebook and the ‘phenomenon of trust and ignorance’: La Trobe - industrial privacy violations | ZDNet
- China uses biometrics and digital scanning 'data doors' to track Muslim minority - cyberwarfare | ZDNet
- Cybersecurity for the Public Interest - government surveillance - Schneier on Security
- Ericsson: 5G can boost enterprise revenue, but security controversy slowing down industry | ZDNet
- Singapore, Canada complete blockchain trial for cross-border payments | ZDNet
- Google's Fuchsia OS: Everything You Need to Know | Digital Trends
- Fuchsia OS: What you need to know - It's FOSS
- Fuchsia OS Explained :-The Future of Android?
- How do I add the DuckDuckGo .onion version to the Tor Browser search providers? - Tor Stack Exchange
- Is it safe to use Adblock Plus addon with Tor Browser Bundle? - Tor Stack Exchange
- How to properly start tor service - Tor Stack Exchange
- Fishing in the Piracy Stream: How
the Dark Web of Entertainment is
Exposing Consumers to Harm - Malware Spreading through video streaming
- How to Choose Between 720p, 1080i, and 1080p Resolutions
- Putin Will Put Russia Behind an Internet Curtain | WIRED
- Hackers steal card data from 201 online campus stores from Canada and the US -Magecart hacking group breached PrismRBS and modified the PrismWeb e-commerce platform.| ZDNet
- How to Install and Use Tor Network in Your Web Browser
- GitHub - ropnop/kerbrute: A tool to perform Kerberos pre-auth bruteforcing
- A hacker is wiping Git repositories and asking for a ransom | ZDNet
- Security flaws in 100+ Jenkins plugins put enterprise networks at risk | ZDNet
- Security flaw lets attackers recover private keys from Qualcomm chips - Hardware Security - Qualcomm Secure Execution Environment (QSEE) vulnerabilities
- Hacker takes over 29 IoT botnets - C2 Servers Compromise | ZDNet
- Europol Shuts Down Two Major Illegal 'Dark Web' Trading Platforms - TOR Vulnerabilities, Anonymity. throughout attack
- A Mysterious Hacker Group Is On a Supply Chain Hijacking Spree | WIRED
- This password-stealing malware just evolved a new tactic to remain hidden - Detection Evasion | ZDNet
- How Can Foreigners Set Up Businesses in Singapore? | SingaporeLegalAdvice.com
- U.S. will rethink cooperation with allies who use Huawei: official - cyberwarfare, 5G security risks - Reuters
- Open source has a working-for-free problem
- ProtonMail now offers elliptic curve cryptography ECC for advanced security and faster speeds - vs RSA, timing attack, X25519/Curve25519 systems - ProtonMail Blog
- Hacker Finds He Can Remotely Kill Car Engines After Breaking Into GPS Tracking Apps - Car Hacking - Motherboard
- The Difference Between 720p and 1080i
- Flat Panel TV Info - 720i vs. 720p vs. 1080i vs. 1080p
- A (relatively easy to understand) primer on elliptic curve cryptography - ECC fundamentals/basics | Ars Technica
- GitHub - cisco/joy: A package for capturing and analyzing network flow data and intraflow data, for network research, forensics, and security monitoring. Traffic analysis
- Japanese government to create and maintain defensive malware - cyberweapon, cyberwarfare | ZDNet
- NATO Declares Cyber an Official Warfare Battleground, Next to Air, Sea and Land. - cyberwarfare
- What Is Application Shielding? DRM, Obfuscation, Reverse Engineering | WIRED
- Marketplaces and ecommerces comparison : Priceminister, Cdiscount, Fnac, Amazon, Rue du commerce, La Redoute, Pixmania, etc... | E-commerce Enhancer
- Chipset - Data Flow Management System that manages the data flow between the processor, memory and peripherals.
- Kensington Security Slot - physical laptop anti theft system - Wikipedia
- What Is a “Chipset”, and Why Should I Care?
- Red Teaming - Command and Control C2 Server - Hacking Articles
- Israel Retaliates To A Cyber-Attack With Immediate Physical Action In A World First - cyberwarfare, physical military response to cyberattack
- First Physical Retaliation for a Cyberattack - zionist regime attack against Hamas - definitive - Schneier on Security
- What Israel's Strike on Hamas Hackers Means For Cyberwar | WIRED
- WhatsApp vulnerability exploited to infect phones with Israeli spyware | Ars Technica
- WhatsApp hackers hit iPhone and Android users in 'advanced' cyber attack - israeli nso group - Mirror Online
- WhatsApp vulnerability: How to update WhatsApp on iPhone or Android - Israeli nso group | Metro News
- WhatsApp security issues: Hackers attack iPhones and Androids with code - nso israeli group | Metro News
- It's 2019 and a WhatsApp call can hack a phone: Zero-day exploit infects mobes with spyware - israeli nso group, buffer overflow • The Register
- CVE-2019-3568 , israeli nso group
- Hackers Used WhatsApp 0-Day Flaw to Secretly Install Spyware On Phones - israeli nso group, buffer overflow
- Amazon.com: gaming laptop amd ryzen
- Quantum Computing Concepts | Microsoft Docs
- security - How to securely delete data after rm - secure deletion/erasure, shred, filesystem journal - Unix & Linux Stack Exchange
- Process (computing) - Wikipedia
- Computer program - Wikipedia
- Difference: Program VS Process VS Thread | Yumi Chan's Blog
- What is difference between thread, process and program? - Quora
- Difference between a process and a program - operating system
- multithreading - Task vs. process, is there really any difference? - Stack Overflow
- multithreading - Why should I use a thread vs. using a process? - Stack Overflow
- Scavenger - Is A Multi-Threaded Post-Exploitation Scanning Tool For Scavenging Systems, Finding Most Frequently Used Files And Folders As Well As "Interesting" Files Containing Sensitive Information - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- What the US Can Learn from Israel and China's Collaboration | WIRED
- 7 CI/CD tools for sysadmins | Opensource.com
- Hacker Discloses New Unpatched Windows Zero-Day Exploit On Twitter
- The Meteorite Hunters Who Descended on the Carancas Fall | WIRED
- Fourth Industrial Revolution - Wikipedia
- Industry 4.0 - Wikipedia
- New Malware Takes Commands From Memes Posted On Twitter
- Russia's IRA Targeted Black Americans, Exploiting Racial Tensions | WIRED
- How Instagram Became the Russian IRA's Go-To Social Network | WIRED
- How Russian Trolls Used Meme Warfare to Divide America | WIRED
- How To Install OpenLDAP Server for Centralized Authentication
- Punk.Py - Unix SSH Post-Exploitation Tool - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Vital Concepts for the Modern JavaScript Developer | Toptal
- David-Reguera-Garcia-Dreg (David Reguera Garcia aka Dreg) · GitHub
- Clean Architecture on Android | Toptal
- Wim ten Brink's answer to What is the most complicated piece of code ever written? - Quora
- windows linux subsystem implementation - Google Search
- How Does the Windows 10 Subsystem for Linux Work and What Is It For? - Petri
- Why the Windows Subsystem for Linux Matters to You – Even if You Don’t | IT Pro
- How does JVM works internally? - Quora
- Windows Subsystem for Linux: Architectural Overview | Seth Juarez | Channel 9
- Emacs on the Linux Subsystem for Windows - The Lone C++ Coder's Blog
- Why don't they call it 'Windows subsystem for GNU'? - Quora
- Windows Subsystem for Linux – The underlying technology enabling the Windows Subsystem for Linux
- Problem loading page
- Learn about the Windows Subsystem for Linux | Microsoft Docs
- Problem loading page
- pyHAWK - Searches The Directory Of Choice For Interesting Files. Such As Database Files And Files With Passwords Stored On Them - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Mayday! NASA Warns Employees of Personal Information Breach
- Why can't hackers make Xcode to run on Windows? - Quora
- Hackers are increasingly destroying logs to hide attacks | ZDNet
- If Wi-Fi security is a real concern, launch a virtual private network – The Seattle Times
- Two botnets are fighting over control of thousands of unsecured Android devices | ZDNet
- Remove Time Limit From Trial Software With Time Stopper
- Forfait — Wikipédia
- c++ - Deviarev2 Hook API: Hook into existing process winapi calls? - Stack Overflow
- c++ - Intercepting WinAPI calls and modifying return values - Stack Overflow
- middleware vs operating system at DuckDuckGo
- webserver - What is the difference between "middleware" and "application server"? - Stack Overflow
- What is Middleware - Definition and Examples | Microsoft Azure
- operating system - Virtual Machine Vs. Middleware - Stack Overflow
- jvm vs vm at DuckDuckGo
- jvm - Is the Java Virtual Machine really a virtual machine in the same sense as my VMWare or Parallels file? - Stack Overflow
- java - What is the difference between DVM and JVM? - Stack Overflow
- stack based machine vs register based machine at DuckDuckGo
- Why is the JVM stack-based and the Dalvik VM register-based? - Stack Overflow
- Stack machine - Wikipedia
- Which architecture do modern computers use? - Computer Science Stack Exchange
- Get started with Remote Desktop on Android | Microsoft Docs
- remote desktop windows from linux at DuckDuckGo
- Connect to a Windows PC from Ubuntu via Remote Desktop Connection | Digital Citizen
- windows remote desktop wiki at DuckDuckGo
- windows remote desktop vs team viewer at DuckDuckGo
- xen desktop vs team viewer at DuckDuckGo
- rdp vs vnc at DuckDuckGo
- Remote Desktop Roundup: TeamViewer vs. Splashtop vs. Windows RDP
- WinPcap - Home
- usbpcap at DuckDuckGo
- USBPcap
- USBPcap Tutorial? - Wireshark Q&A
- PenTest: Mighty Python - Pentestmag
- SBC: Penetration Testing with Raspberry Pi (W42) - Hakin9 - IT Security Magazine
- BashFAQ/031 - Greg's Wiki
- files - How are chown and chmod command different in the given operation? - Unix & Linux Stack Exchange
- Radboud University researchers discover security flaws in widely used data storage devices - Radboud University
- honor mobile tethering linux interface not recognized at DuckDuckGo
- What is the difference between 'git pull' and 'git fetch'? - Stack Overflow
- boost beast websocket stream at DuckDuckGo
- boost/beast/websocket/stream.hpp - develop
- Travis Casey's answer to Why did Intel name their processors as i3, i5 and i7 instead of i2, i4 and i6 or i1, i2, i3, i4 and so on? - Quora
- PortSmash : une nouvelle faille critique qui affecte les CPU Intel exploitant l'Hyperthreading ou le SMT, des CPU AMD pourraient aussi être touchés
- Des attaquants exploitent une vulnérabilité logicielle sur des Appliances Cisco, aucune mise à jour ne résout ce problème à l'heure actuelle
- Les hackers pourraient bientôt s'attaquer au cerveau humain, pour dérober des souvenirs ou provoquer des lésions cérébrales
- Hackers attacking your memories: science fiction or future threat? | Securelist
- Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software Denial of Service Vulnerability
- Il existe « quelques preuves » d'un lien entre le rayonnement des téléphones cellulaires et le cancer, selon une importante étude
- Invisi-Shell - Hide Your Powershell Script In Plain Sight (Bypass All Powershell Security Features) - KitPloit - PenTest & Hacking Tools for your CyberSecurity Kit ☣
- Hacker Who DDoSed Sony, EA and Steam Gaming Servers Pleads Guilty
- A DJI Bug Exposed Drone Photos and User Data | WIRED
- HSBC suffers data breach after hackers access customers' personal data
- Best Anonymization Tools and Techniques for 2019 - definitive
- Does your team need to learn how to break things? | Opensource.com
- node.js - Why use AJAX when WebSockets is available? - Stack Overflow
- Overview of Build Systems
- How to spy on someone's phone without touching theirs - Quora
- hping - Wikipedia
- tcpdump - Using hping to inject packet into TCP netcat connection - Stack Overflow
- hping vs netcat - Google Search
- Wappalyzer - Technologies
- WIFI is abbreviation for what? - Quora
- Wi-Fi - Wikipedia
- Facebook Used Its VPN to Spy on Other Companies, Users - ExtremeTech
- New Adobe Flash Zero-Day Exploit Found Hidden Inside MS Office Docs
- wired.com/story/private-firms-do-government-dirty-work/
- uint8_t vs unsigned char at DuckDuckGo
- stackoverflow.com/questions/28509796/boostasio-how-to-read-full-buffer-in-right-way
- command line - Why does "ps aux | grep x" give better results than "pgrep x"? - Ask Ubuntu
- askubuntu.com/questions/129962/ps-ef-vs-ps-aux
- stackoverflow.com/questions/26656943/how-to-get-data-in-python-from-ros-in-real-time
- enigma reverse engineering - Google Search
- vmprotect reverse engineering at DuckDuckGo
- oep reverse engineering - Google Search
- Shebang (Unix) - Wikipedia
- stackoverflow.com/questions/1123650/how-to-find-the-return-value-of-last-executed-command-in-unix
- idl format at DuckDuckGo
- Ultimate solutions to unmask hidden WordPress malware by Zehra Ali - Hakin9 - IT Security Magazine
- Threat Intelligence: A Different Approach to Meet Cyber Security Needs by Jonathan Zhang - Hakin9 - IT Security Magazine
- Trello vs. Jira Comparison | Toptal
- debit card skimmer at DuckDuckGo
- signed number representation depend architecture - Google Search
- DOJ Indicts 2 Iranian Hackers for Harmful SamSam Ransomware | WIRED
- thehackernews.com/2018/11/samsam-ransomware-iranian-hackers.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+TheHackersNews+%28The+Hackers+News+-+Security+Blog%29&m=1
- Russian Hackers Haven't Stopped Probing the US Power Grid | WIRED
- D-Bus - Wikipedia
- evemu tool at DuckDuckGo
- iec vs iso at DuckDuckGo
- snmtp vs icmp at DuckDuckGo
- stackoverflow.com/questions/10344699/comparison-of-icmp-and-snmp-ping-in-terms-of-traffic
- MVVM with Clean Architecture: Android Apps that Scale | Toptal
- shodan vs censys at DuckDuckGo
- how to list mounted devices in linux at DuckDuckGo
- The Raspberry Pi Beginner's Guide is out now (and it's huge!) - Raspberry Pi
- How to Write Your First Node.js App in Linux
- How to Install PM2 to Run Node.js Apps on Production Server
- Warning! Unprivileged Linux Users With UID > INT_MAX Can Execute Any Command
- polymorphism cost c++ vs c at DuckDuckGo
- cost comparison of run-time polymorphism in c++ vs java - Stack Overflow
- stackoverflow.com/questions/10167094/cost-of-polymorphic-calls-c
- dynamic binding compile time c++ at DuckDuckGo
- stackoverflow.com/questions/22066647/what-is-the-difference-between-compile-time-polymorphism-and-static-binding
- stackoverflow.com/questions/737567/dynamic-binding-in-c
- dynamic dispatch at compile time - Google Search
- stackoverflow.com/questions/7464889/interface-paradigm-performance-dynamic-binding-vs-generic-programming
- stackoverflow.com/questions/2128838/compile-time-polymorphism-and-runtime-polymorphism
- why is dynamic binding not performed at compile time - Google Search
- softwareengineering.stackexchange.com/questions/200115/what-is-early-and-late-binding
- stackoverflow.com/questions/18035293/what-is-early-static-and-late-dynamic-binding-in-c
- stackoverflow.com/questions/32422923/why-does-java-bind-variables-at-compile-time
- jvm - Java dynamic binding: Why the compiler cannot distinguish overriden methods - Stack Overflow
- stackoverflow.com/questions/3375876/c-dynamic-binding
- stackoverflow.com/questions/17250236/difference-between-dynamic-loading-and-dynamic-binding/17250349#17250349
- c vs c++ performance at DuckDuckGo
- stackoverflow.com/questions/6955114/is-c-notably-faster-than-c
- stackoverflow.com/questions/2513741/c-vs-c-for-performance-in-memory-allocation
- When to use C over C++, and C++ over C? - Software Engineering Stack Exchange
- ed editor at DuckDuckGo
- emacs diff patch feature at DuckDuckGo
- emacs.stackexchange.com/questions/19721/how-to-create-a-patch-git-diff-with-a-specific-name
- double vs float c c++ at DuckDuckGo
- c++ - What is the difference between float and double? - Stack Overflow
- c - 'float' vs. 'double' precision - Stack Overflow
- stackoverflow.com/questions/3580389/c-c-sharp-differences-with-float-and-double
- stackoverflow.com/questions/39900952/is-stof-strtof-deterministic
- c++ - What is the meaning of numeric_limits<double>::digits10 - Stack Overflow
- stackoverflow.com/questions/39917843/what-is-the-difference-between-github-flow-and-gitlab-flow